Zscaler Discloses Data Breach Following Salesforce Instance Compromise

Cybersecurity firm Zscaler has disclosed a data breach affecting customer contact information after unauthorized actors gained access to the company’s Salesforce database through compromised third-party application credentials. The breach originated from a broader campaign targeting Salesloft Drift, a marketing automation…

New TinkyWinkey Trojan Targets Windows Systems With Sophisticated Keylogging

A sophisticated new keylogger malware dubbed “TinkyWinkey” that is targeting Windows systems with advanced stealth capabilities and comprehensive data exfiltration features. First observed in late June 2025, this malware represents a significant evolution in keylogging technology, combining multiple attack vectors…

Are You Fully Satisfied with Your Secrets Rotation?

Are Your Secrets Rotation Standards Meeting Expectations? Does your organization have a comprehensive secrets rotation system that instills confidence and satisfaction? Secrets rotation is a pivotal aspect of data management, especially concerning Non-Human Identities (NHIs). NHIs and secrets security management…

Innovator Spotlight: StrikeReady

Security’s Silent Revolution: How StrikeReady is Transforming SOC Operations Security operations centers (SOCs) have long been the unsung heroes of cybersecurity, battling endless alerts and wrestling with fragmented toolsets. But… The post Innovator Spotlight: StrikeReady appeared first on Cyber Defense…