

Threat Update 50 – Critical Salesforce Misconfiguration
source link: https://www.varonis.com/blog/threat-update-50-critical-salesforce-misconfiguration/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Threat Update 50 – Critical Salesforce Misconfiguration
Inside Out Security Blog » Cybersecurity News » Threat Research » Threat Update 50 – Critical Salesforce Misconfiguration
Salesforce is the lifeblood of many organizations. The amount of critical, and sensitive information stored within is astronomical – however, there are parts of the solution designed to be accessed by non-corporate users, such as the Community module.
Join Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team as they dive into a potential misconfiguration within Salesforce that could allow external entities to access data stored in the protected areas of Salesforce.
👉You can read the full, detailed breakdown of the misconfiguration, how to check for it, and recommendations.
👉To learn how else we can help, please visit us at: https://www.varonis.com/help/

Kilian Englert
Kilian has a background in enterprise security engineering, as well as security solution selling. Kilian is a Certified Information Systems Security Professional (CISSP) and creates internal and public content on topics related to cyber security and technology best practices.
Recommend
-
91
README.md off-by-slash Burp extension to detect alias traversal via NGINX misconfiguration at scale. Requires Burp Professional.
-
75
README.md
-
14
Cybersecurity Executive Order: Can automation fix the nation’s misconfiguration problem? by Andrew Plato | May 14, 2021 |
-
9
Threat of major cyber attack on critical infrastructure real, national security boss warnsBy political reporter Nour HaydarPosted MonMonday 24 Ma...
-
1
Threat Update 60 – Abusing Public Salesforce APIs for Fun & Profit Incident Response ...
-
5
News A Critical DRAM Fault Poses a Looming Threat to CPU Security Rowhammer attacks are just one type of affront to DRAM security. Now, a team at ETH Zürich has uncovered an even more insidious threat to CPU memor...
-
13
Security Risks On Rails: Misconfiguration and Unsafe Integrations In the third and final article of our series on the OWASP Top 10 Web Application Security Risks, we’ll ex...
-
6
Inside Out Security Blog / Data Security...
-
6
News Misconfiguration and vulnerabilities biggest risks in cloud security: Report
-
6
Misconfiguration Could Set Up Cyber AttacksMisconfigurations are a major source of cyber vulnerabilities. Where are they most prevalent and what can be done to address them?
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK