Company Details
tenableinc
2,331
185,257
541514
tenable.com
0
TEN_3158057
In-progress

Tenable Company CyberSecurity Posture
tenable.comTenable is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com.
Company Details
tenableinc
2,331
185,257
541514
tenable.com
0
TEN_3158057
In-progress
Between 700 and 749

Tenable Global Score (TPRM)XXXX

Description: Tenable, a vulnerability assessment firm, was impacted by the **SalesDrift supply chain attack** targeting Salesforce customer data. An unauthorized user exploited stolen **OAuth authentication tokens** linked to the **Salesloft Drift** third-party application (integrated with Salesforce) to gain access to a portion of Tenable’s **Salesforce instance**.The compromised data included **customer support case details** (subject lines, initial descriptions) and **business contact information** (names, email addresses, phone numbers, and location references). While Tenable confirmed **no misuse of the stolen data** and stated its **products and internal systems remained unaffected**, the breach exposed sensitive customer interaction records and corporate contact details.Tenable responded by **disabling Salesloft Drift**, revoking integrations, rotating credentials, and hardening its Salesforce environment. The incident highlights risks in **third-party supply chain vulnerabilities**, where attackers leverage trusted vendor access to infiltrate enterprise systems. Though no direct financial or operational harm was reported, the exposure of **customer support metadata and business contacts** poses reputational and phishing risks.
Description: **LevelBlue Expands Tenable Partnership to Offer Unlimited Vulnerability Scanning at No Extra Cost** LevelBlue has deepened its collaboration with Tenable, now providing unlimited enterprise-grade vulnerability scanning for all customers using its **Unified Security Management (USM) platform**—without additional fees. The move aims to address a persistent challenge in vulnerability management: not the lack of scanning, but the ability to act on findings effectively. While unlimited scanning increases visibility, the real shift lies in **prioritization, remediation, and operational execution**. The USM platform enhances raw scan data with **advanced filtering, categorization, and risk-based prioritization**, helping teams focus on critical vulnerabilities. Automated executive reporting also tracks risk posture over time, aiding compliance and leadership oversight. For organizations requiring broader coverage—such as **attack surface monitoring (ASM), OT, web applications, or dark web exposure**—LevelBlue offers a seamless upgrade to its **fully managed vulnerability program**. Since the scanner is pre-configured, migration involves only a license change, reducing operational friction. Customers retain flexibility: they can **keep existing Tenable licenses** (via bi-directional integration with Tenable One or Security Center) or **consolidate under the embedded USM scanner**, simplifying vendor management and potentially lowering costs. Managed delivery options further streamline operations, allowing LevelBlue to handle Tenable instances while maintaining client visibility. The integration also reshapes how **MSSPs and partners** package vulnerability services. By embedding enterprise-grade scanning at no extra cost, LevelBlue shifts scanning from a premium add-on to a **baseline capability**. This approach contrasts with competitors who treat vulnerability scanning as an incremental expense, instead positioning it as part of a **unified security stack**. Beyond scanning, the update emphasizes **exposure management**—correlating Tenable findings with live detections, contextual prioritization, and end-to-end remediation tracking. The result is a **continuous, actionable view of risk**, moving beyond static reports to real-time reduction of exposure. For security teams and service providers, the change signals a broader industry trend: **reducing tool sprawl while improving outcomes** through tighter integration between vulnerability data and security operations.


Tenable has 194.12% more incidents than the average of same-industry companies with at least one recorded incident.
Tenable has 156.41% more incidents than the average of all companies with at least one recorded incident.
Tenable reported 2 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
Tenable cyber incidents detection timeline including parent company and subsidiaries

Tenable is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com.

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest s

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-clas

## Our core business We manage linux / unix server infrastructures and build the efficient and secure networking environments using hardware cutting edge technologies suited to the needs of the project and the client. We believe in quality, opposed to quantity. Our company consists of highly
.png)
Tenable's cloud security capabilities will be available at a 65 percent discount through GSA's Multiple Award Schedule – IT Category.
Exposure management company Tenable announced a OneGov agreement with the U.S. General Services Administration (GSA) to deliver its...
Tenable is expanding its partnership with the U.S. federal government by supporting the U.S. General Services Administration OneGov...
Tenable partners with GSA to provide discounted Cloud Security solutions for U.S. federal agencies t.
Tenable Public Sector has joined the OneGov ranks to offer a discounted rate on its cloud security enterprise solution, the General Services...
This is the General Services Administration's 17th agreement signed for enterprise-level pricing to all federal agencies.
Tenable's co-CEO promotes a unified, AI-powered exposure management approach in Saudi Arabia to secure ambitious digital projects and...
Thurmond explains what exposure management means in practice, why the Middle East is a strategic priority for Tenable.
Tenable is redefining cybersecurity through an exposure-management approach that unifies visibility across cloud, IT, identity and OT...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Tenable is http://www.tenable.com.
According to Rankiteo, Tenable’s AI-generated cybersecurity score is 703, reflecting their Moderate security posture.
According to Rankiteo, Tenable currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Tenable is not certified under SOC 2 Type 1.
According to Rankiteo, Tenable does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Tenable is not listed as GDPR compliant.
According to Rankiteo, Tenable does not currently maintain PCI DSS compliance.
According to Rankiteo, Tenable is not compliant with HIPAA regulations.
According to Rankiteo,Tenable is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Tenable operates primarily in the Computer and Network Security industry.
Tenable employs approximately 2,331 people worldwide.
Tenable presently has no subsidiaries across any sectors.
Tenable’s official LinkedIn profile has approximately 185,257 followers.
Tenable is classified under the NAICS code 541514, which corresponds to Others.
Yes, Tenable has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/tenable-network-security.
Yes, Tenable maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/tenableinc.
As of December 24, 2025, Rankiteo reports that Tenable has experienced 2 cybersecurity incidents.
Tenable has an estimated 3,179 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with salesforce, third party assistance with google cloud’s mandiant, and containment measures with disabled salesloft drift application, containment measures with revoked associated integrations, containment measures with rotated integration credentials, and remediation measures with hardened salesforce environment (tenable), remediation measures with collaborated with salesforce and mandiant (qualys), and recovery measures with restored salesloft-salesforce integration (as of 2024-09-07), and communication strategy with public security alerts (tenable: 2024-09-03, qualys: 2024-09-06), communication strategy with nudge security dashboard tracking affected companies, and enhanced monitoring with okta: restricted inbound ip access to salesforce, and remediation measures with advanced filtering, categorization, and prioritization of vulnerabilities; executive-level reporting; seamless upgrade path to fully managed vulnerability program., and communication strategy with executive-level reporting to track risk posture over time; visibility for leadership and compliance efforts., and enhanced monitoring with continuous view of risk through correlation of tenable findings with live detections...
Title: SalesDrift Supply Chain Attack Targeting Salesforce Customer Data via OAuth Token Theft
Description: A supply chain attack targeting Salesforce customer data involved the theft of OAuth authentication tokens connected to Salesloft Drift, a third-party application integrated with Salesforce. Attackers gained unauthorized access to customer information stored in Salesforce instances of multiple companies, including Tenable and Qualys. The breach exposed business contact information and support case details, though no evidence of misuse was found. The attack was first identified by Google Threat Intelligence Group (GTIG) in August 2024, with initial compromise dating back to March 2024. Multiple cybersecurity firms were affected, and responses included disabling Salesloft Drift, revoking integrations, and collaborating with Salesforce and Mandiant for investigations.
Date Detected: 2024-08-26
Date Publicly Disclosed: 2024-09-03
Type: Supply Chain Attack
Attack Vector: Stolen OAuth TokensThird-Party Application Compromise (Salesloft Drift)Dormant Persistence
Vulnerability Exploited: Weak OAuth Token SecurityLateral Movement via Stolen Credentials
Motivation: Data ExfiltrationPotential Espionage or Financial Gain (unconfirmed)
Title: None
Description: LevelBlue expanded its partnership with Tenable to include unlimited, enterprise-grade vulnerability scanning for all customers using the LevelBlue Unified Security Management (USM) platform at no additional cost. The update removes constraints in vulnerability programs and shifts focus to prioritization, remediation, and operational follow-through to reduce risk.
Type: Vulnerability Management Enhancement
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Salesloft Drift (Compromised in March 2024).

Data Compromised: Business contact information (names, emails, phone numbers, locations), Support case subject lines and initial descriptions
Systems Affected: Salesforce InstancesSalesloft Drift Integration
Operational Impact: Temporary Disruption of Salesloft Drift IntegrationInvestigation and Remediation Efforts
Brand Reputation Impact: Potential Erosion of Trust Due to Supply Chain Vulnerability
Identity Theft Risk: ['Low (no PII misuse reported)']

Operational Impact: Improved operational efficiency and risk reduction through integrated vulnerability management and exposure management.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Business Contact Information, Support Case Metadata and .

Entity Name: Tenable
Entity Type: Cybersecurity Firm (Vulnerability Assessment)
Industry: Cybersecurity
Customers Affected: Portion of customers with data in Salesforce

Entity Name: Qualys
Entity Type: Cybersecurity Firm (Risk Management)
Industry: Cybersecurity

Entity Name: Google
Entity Type: Technology Company
Industry: Technology
Customers Affected: Limited number of Google Workspace users

Entity Name: BeyondTrust
Entity Type: Cybersecurity Firm
Industry: Cybersecurity

Entity Name: Bugcrowd
Entity Type: Cybersecurity Firm (Crowdsourced Security)
Industry: Cybersecurity

Entity Name: Cato Networks
Entity Type: Cybersecurity Firm (Network Security)
Industry: Cybersecurity

Entity Name: Cloudflare
Entity Type: Cybersecurity Firm (Web Infrastructure)
Industry: Cybersecurity

Entity Name: CyberArk
Entity Type: Cybersecurity Firm (Privileged Access Management)
Industry: Cybersecurity

Entity Name: Elastic
Entity Type: Cybersecurity Firm (Search and Analytics)
Industry: Cybersecurity

Entity Name: JFrog
Entity Type: Cybersecurity Firm (DevOps Security)
Industry: Cybersecurity

Entity Name: Nutanix
Entity Type: Cloud Computing Firm
Industry: Technology

Entity Name: PagerDuty
Entity Type: Incident Response Firm
Industry: Cybersecurity

Entity Name: Palo Alto Networks
Entity Type: Cybersecurity Firm
Industry: Cybersecurity

Entity Name: Rubrik
Entity Type: Cybersecurity Firm (Data Protection)
Industry: Cybersecurity

Entity Name: SpyCloud
Entity Type: Cybersecurity Firm (Identity Protection)
Industry: Cybersecurity

Entity Name: Tanium
Entity Type: Cybersecurity Firm (Endpoint Management)
Industry: Cybersecurity

Entity Name: Zscaler
Entity Type: Cybersecurity Firm (Cloud Security)
Industry: Cybersecurity

Entity Name: Okta
Entity Type: Cybersecurity Firm (Identity Management)
Industry: Cybersecurity
Customers Affected: Attack Attempt Blocked (No Compromise)

Entity Name: Salesloft
Entity Type: Sales Automation Platform
Industry: Technology
Customers Affected: Multiple (OAuth Tokens Stolen in June 2024)

Entity Name: LevelBlue
Entity Type: Cybersecurity Service Provider
Industry: Cybersecurity
Customers Affected: All customers using LevelBlue USM platform

Entity Name: Tenable
Entity Type: Cybersecurity Vendor
Industry: Cybersecurity

Incident Response Plan Activated: True
Third Party Assistance: Salesforce, Google Cloud’S Mandiant.
Containment Measures: Disabled Salesloft Drift ApplicationRevoked Associated IntegrationsRotated Integration Credentials
Remediation Measures: Hardened Salesforce Environment (Tenable)Collaborated with Salesforce and Mandiant (Qualys)
Recovery Measures: Restored Salesloft-Salesforce Integration (as of 2024-09-07)
Communication Strategy: Public Security Alerts (Tenable: 2024-09-03, Qualys: 2024-09-06)Nudge Security Dashboard Tracking Affected Companies
Enhanced Monitoring: Okta: Restricted Inbound IP Access to Salesforce

Remediation Measures: Advanced filtering, categorization, and prioritization of vulnerabilities; executive-level reporting; seamless upgrade path to fully managed vulnerability program.
Communication Strategy: Executive-level reporting to track risk posture over time; visibility for leadership and compliance efforts.
Enhanced Monitoring: Continuous view of risk through correlation of Tenable findings with live detections.
Third-Party Assistance: The company involves third-party assistance in incident response through Salesforce, Google Cloud’s Mandiant, .

Type of Data Compromised: Business contact information, Support case metadata
Sensitivity of Data: Low to Moderate (No Highly Sensitive PII or Financial Data)
Personally Identifiable Information: NamesBusiness Email AddressesPhone NumbersLocation References
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Hardened Salesforce Environment (Tenable), Collaborated with Salesforce and Mandiant (Qualys), , Advanced filtering, categorization, and prioritization of vulnerabilities; executive-level reporting; seamless upgrade path to fully managed vulnerability program..
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by disabled salesloft drift application, revoked associated integrations, rotated integration credentials and .
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Restored Salesloft-Salesforce Integration (as of 2024-09-07), .

Regulatory Notifications: Supports compliance efforts through executive-level reporting.

Lessons Learned: OAuth token security requires stricter monitoring and rotation policies., Third-party integrations pose significant supply chain risks and must be continuously audited., Dormant threats can persist for months (initial compromise in March, exploitation in August)., Proactive measures like IP restrictions (Okta) can prevent unauthorized access.

Lessons Learned: Vulnerability management often fails due to overwhelming scan results rather than lack of scanning. Prioritization, remediation, and operational follow-through are critical to reducing risk. Unlimited scanning alone does not solve the problem without proper integration and actionable insights.

Recommendations: Implement multi-layered authentication for third-party integrations., Enforce least-privilege access for OAuth tokens and revoke unused credentials., Monitor for anomalous activity in integrated applications, especially after dormant periods., Adopt zero-trust principles for Salesforce and similar cloud platforms., Collaborate with vendors (e.g., Salesforce) to share threat intelligence and hardening guidelines.Implement multi-layered authentication for third-party integrations., Enforce least-privilege access for OAuth tokens and revoke unused credentials., Monitor for anomalous activity in integrated applications, especially after dormant periods., Adopt zero-trust principles for Salesforce and similar cloud platforms., Collaborate with vendors (e.g., Salesforce) to share threat intelligence and hardening guidelines.Implement multi-layered authentication for third-party integrations., Enforce least-privilege access for OAuth tokens and revoke unused credentials., Monitor for anomalous activity in integrated applications, especially after dormant periods., Adopt zero-trust principles for Salesforce and similar cloud platforms., Collaborate with vendors (e.g., Salesforce) to share threat intelligence and hardening guidelines.Implement multi-layered authentication for third-party integrations., Enforce least-privilege access for OAuth tokens and revoke unused credentials., Monitor for anomalous activity in integrated applications, especially after dormant periods., Adopt zero-trust principles for Salesforce and similar cloud platforms., Collaborate with vendors (e.g., Salesforce) to share threat intelligence and hardening guidelines.Implement multi-layered authentication for third-party integrations., Enforce least-privilege access for OAuth tokens and revoke unused credentials., Monitor for anomalous activity in integrated applications, especially after dormant periods., Adopt zero-trust principles for Salesforce and similar cloud platforms., Collaborate with vendors (e.g., Salesforce) to share threat intelligence and hardening guidelines.

Recommendations: Integrate vulnerability scanning with detection and response workflows for continuous risk visibility., Use advanced filtering, categorization, and prioritization to focus on critical vulnerabilities., Leverage executive-level reporting to track risk posture over time and support compliance efforts., Consider managed services to streamline operations and reduce internal resource burdens., Monetize vulnerability management through layered services like advanced reporting and remediation support.Integrate vulnerability scanning with detection and response workflows for continuous risk visibility., Use advanced filtering, categorization, and prioritization to focus on critical vulnerabilities., Leverage executive-level reporting to track risk posture over time and support compliance efforts., Consider managed services to streamline operations and reduce internal resource burdens., Monetize vulnerability management through layered services like advanced reporting and remediation support.Integrate vulnerability scanning with detection and response workflows for continuous risk visibility., Use advanced filtering, categorization, and prioritization to focus on critical vulnerabilities., Leverage executive-level reporting to track risk posture over time and support compliance efforts., Consider managed services to streamline operations and reduce internal resource burdens., Monetize vulnerability management through layered services like advanced reporting and remediation support.Integrate vulnerability scanning with detection and response workflows for continuous risk visibility., Use advanced filtering, categorization, and prioritization to focus on critical vulnerabilities., Leverage executive-level reporting to track risk posture over time and support compliance efforts., Consider managed services to streamline operations and reduce internal resource burdens., Monetize vulnerability management through layered services like advanced reporting and remediation support.Integrate vulnerability scanning with detection and response workflows for continuous risk visibility., Use advanced filtering, categorization, and prioritization to focus on critical vulnerabilities., Leverage executive-level reporting to track risk posture over time and support compliance efforts., Consider managed services to streamline operations and reduce internal resource burdens., Monetize vulnerability management through layered services like advanced reporting and remediation support.
Key Lessons Learned: The key lessons learned from past incidents are OAuth token security requires stricter monitoring and rotation policies.,Third-party integrations pose significant supply chain risks and must be continuously audited.,Dormant threats can persist for months (initial compromise in March, exploitation in August).,Proactive measures like IP restrictions (Okta) can prevent unauthorized access.Vulnerability management often fails due to overwhelming scan results rather than lack of scanning. Prioritization, remediation, and operational follow-through are critical to reducing risk. Unlimited scanning alone does not solve the problem without proper integration and actionable insights.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Consider managed services to streamline operations and reduce internal resource burdens., Leverage executive-level reporting to track risk posture over time and support compliance efforts., Integrate vulnerability scanning with detection and response workflows for continuous risk visibility., Monetize vulnerability management through layered services like advanced reporting and remediation support., Use advanced filtering, categorization and and prioritization to focus on critical vulnerabilities..

Source: Tenable Security Alert
Date Accessed: 2024-09-03

Source: Qualys Security Alert
Date Accessed: 2024-09-06

Source: Google Threat Intelligence Group (GTIG) Findings
Date Accessed: 2024-08-26

Source: Salesloft Update on Compromise Timeline
Date Accessed: 2024-09-07

Source: Nudge Security Dashboard (Tracking Affected Companies)

Source: Okta Statement on Blocked Attack Attempt
Date Accessed: 2024-09-02

Source: MSSP Alert
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Tenable Security AlertDate Accessed: 2024-09-03, and Source: Qualys Security AlertDate Accessed: 2024-09-06, and Source: Google Threat Intelligence Group (GTIG) FindingsDate Accessed: 2024-08-26, and Source: Salesloft Update on Compromise TimelineDate Accessed: 2024-09-07, and Source: Nudge Security Dashboard (Tracking Affected Companies), and Source: Okta Statement on Blocked Attack AttemptDate Accessed: 2024-09-02, and Source: MSSP Alert.

Investigation Status: Ongoing (Collaboration with Salesforce and Mandiant)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Security Alerts (Tenable: 2024-09-03, Qualys: 2024-09-06), Nudge Security Dashboard Tracking Affected Companies and Executive-level reporting to track risk posture over time; visibility for leadership and compliance efforts..

Stakeholder Advisories: Public Disclosures By Affected Companies, Nudge Security Dashboard.
Customer Advisories: Tenable and Qualys Notified Affected CustomersNo Evidence of Misuse Reported
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Public Disclosures By Affected Companies, Nudge Security Dashboard, Tenable And Qualys Notified Affected Customers, No Evidence Of Misuse Reported and .

Entry Point: Salesloft Drift (Compromised in March 2024)
Reconnaissance Period: March 2024 to June 2024 (Mapping Internal Systems)
High Value Targets: Salesforce Customer Data, Oauth Tokens,
Data Sold on Dark Web: Salesforce Customer Data, Oauth Tokens,

Root Causes: Insufficient Protection Of Oauth Tokens In Salesloft Drift, Delayed Detection Of Initial Compromise (March To August 2024), Lack Of Segmentation Between Third-Party App And Salesforce Data,
Corrective Actions: Disabled Vulnerable Integrations (Salesloft Drift), Hardened Salesforce Environments (E.G., Tenable), Enhanced Monitoring For Anomalous Oauth Token Usage, Restored Salesloft-Salesforce Integration With Improved Security Controls,

Root Causes: Vulnerability management breakdowns due to overwhelming scan results and lack of prioritization/remediation.
Corrective Actions: Embedded Tenable scanning in USM platform with advanced filtering, categorization, and prioritization; seamless upgrade path to managed vulnerability program; integration with detection and response workflows.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Salesforce, Google Cloud’S Mandiant, , Okta: Restricted Inbound Ip Access To Salesforce, , Continuous view of risk through correlation of Tenable findings with live detections..
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Disabled Vulnerable Integrations (Salesloft Drift), Hardened Salesforce Environments (E.G., Tenable), Enhanced Monitoring For Anomalous Oauth Token Usage, Restored Salesloft-Salesforce Integration With Improved Security Controls, , Embedded Tenable scanning in USM platform with advanced filtering, categorization, and prioritization; seamless upgrade path to managed vulnerability program; integration with detection and response workflows..
Most Recent Incident Detected: The most recent incident detected was on 2024-08-26.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-09-03.
Most Significant Data Compromised: The most significant data compromised in an incident were Business Contact Information (names, emails, phone numbers, locations), Support Case Subject Lines and Initial Descriptions and .
Most Significant System Affected: The most significant system affected in an incident was Salesforce InstancesSalesloft Drift Integration.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was salesforce, google cloud’s mandiant, .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Disabled Salesloft Drift ApplicationRevoked Associated IntegrationsRotated Integration Credentials.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Support Case Subject Lines and Initial Descriptions, Business Contact Information (names, emails, phone numbers and locations).
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Proactive measures like IP restrictions (Okta) can prevent unauthorized access., Vulnerability management often fails due to overwhelming scan results rather than lack of scanning. Prioritization, remediation, and operational follow-through are critical to reducing risk. Unlimited scanning alone does not solve the problem without proper integration and actionable insights.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Enforce least-privilege access for OAuth tokens and revoke unused credentials., Monitor for anomalous activity in integrated applications, especially after dormant periods., Consider managed services to streamline operations and reduce internal resource burdens., Collaborate with vendors (e.g., Salesforce) to share threat intelligence and hardening guidelines., Leverage executive-level reporting to track risk posture over time and support compliance efforts., Adopt zero-trust principles for Salesforce and similar cloud platforms., Integrate vulnerability scanning with detection and response workflows for continuous risk visibility., Implement multi-layered authentication for third-party integrations., Monetize vulnerability management through layered services like advanced reporting and remediation support., Use advanced filtering, categorization and and prioritization to focus on critical vulnerabilities..
Most Recent Source: The most recent source of information about an incident are MSSP Alert, Tenable Security Alert, Qualys Security Alert, Nudge Security Dashboard (Tracking Affected Companies), Salesloft Update on Compromise Timeline, Google Threat Intelligence Group (GTIG) Findings and Okta Statement on Blocked Attack Attempt.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (Collaboration with Salesforce and Mandiant).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Public Disclosures by Affected Companies, Nudge Security Dashboard, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Tenable and Qualys Notified Affected CustomersNo Evidence of Misuse Reported.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Salesloft Drift (Compromised in March 2024).
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was March 2024 to June 2024 (Mapping Internal Systems).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Insufficient Protection of OAuth Tokens in Salesloft DriftDelayed Detection of Initial Compromise (March to August 2024)Lack of Segmentation Between Third-Party App and Salesforce Data, Vulnerability management breakdowns due to overwhelming scan results and lack of prioritization/remediation..
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Disabled Vulnerable Integrations (Salesloft Drift)Hardened Salesforce Environments (e.g., Tenable)Enhanced Monitoring for Anomalous OAuth Token UsageRestored Salesloft-Salesforce Integration with Improved Security Controls, Embedded Tenable scanning in USM platform with advanced filtering, categorization, and prioritization; seamless upgrade path to managed vulnerability program; integration with detection and response workflows..
.png)
Marshmallow is a lightweight library for converting complex objects to and from simple Python datatypes. In versions from 3.0.0rc1 to before 3.26.2 and from 4.0.0 to before 4.1.2, Schema.load(data, many=True) is vulnerable to denial of service attacks. A moderately sized request can consume a disproportionate amount of CPU time. This issue has been patched in version 3.26.2 and 4.1.2.
KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.
Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).
An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.