Close Menu
  • Home
  • Psychology
  • Dating
    • Relationship
  • Spirituality
    • Manifestation
  • Health
    • Fitness
  • Lifestyle
  • Family
  • Food
  • Travel
  • More
    • Business
    • Education
    • Technology
What's Hot

Little Help for Meth Addiction

February 20, 2026

How attackers hit 700 organizations through CX platforms your SOC already approved

February 20, 2026

What Is, Is — And Other Lies We Tell Ourselves

February 20, 2026
Facebook X (Twitter) Pinterest YouTube
Facebook X (Twitter) Pinterest YouTube
Mind Fortunes
Subscribe
  • Home
  • Psychology
  • Dating
    • Relationship
  • Spirituality
    • Manifestation
  • Health
    • Fitness
  • Lifestyle
  • Family
  • Food
  • Travel
  • More
    • Business
    • Education
    • Technology
Mind Fortunes
Home»Technology»How attackers hit 700 organizations through CX platforms your SOC already approved
Technology

How attackers hit 700 organizations through CX platforms your SOC already approved

February 20, 2026No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
How attackers hit 700 organizations through CX platforms your SOC already approved
Share
Facebook Twitter LinkedIn Pinterest Email

CX platforms are responsible for handling billions of unstructured interactions each year. These interactions come from various sources such as survey forms, review sites, social media feeds, call center transcripts, and more. They are processed by AI engines that trigger automated workflows which interact with payroll systems, CRM platforms, and payment systems. Unfortunately, many security operation center leaders fail to recognize the risks associated with these AI engines and the data they consume, leaving them vulnerable to attacks.

One significant breach that highlighted this issue occurred in August 2025 involving Salesloft and Drift. Attackers were able to compromise Salesloft’s GitHub environment, steal Drift chatbot OAuth tokens, and access Salesforce environments across over 700 organizations, including major companies like Cloudflare, Palo Alto Networks, and Zscaler. They scanned the stolen data for valuable information like AWS keys, Snowflake tokens, and plaintext passwords without deploying any malware.

Despite the prevalence of data loss prevention (DLP) programs, only a small percentage of organizations allocate dedicated resources to address these issues. This lack of focus on input integrity can lead to severe consequences as attackers increasingly exploit legitimate access rather than relying on malware to carry out intrusions.

Experience management platforms like Qualtrics process billions of interactions annually, connecting with various systems such as HRIS, CRM, and compensation engines. The rise of AI in workflows has made it crucial for organizations to prioritize input integrity to prevent data breaches and unauthorized access.

Security leaders are actively working to bridge the gap between the security stack and AI engines within CX platforms. Six key control failures have been identified in this process, including issues related to unstructured data leaving the system, live API tokens from past campaigns, lack of bot mitigation for public input channels, and more.

See also  T-Mobile Users Hit With $96 Charge Alert After Losing DashPass Perk

To address these blind spots, security teams are exploring new solutions such as extending security posture management tools, implementing API security gateways, and applying CASB-style access controls to CX admin accounts. The goal is to ensure continuous monitoring of data access, real-time visibility into misconfigurations, and automated protection to enforce policy compliance.

By integrating posture management directly into the CX layer, security teams can gain better control over program activity, configurations, and data access. This approach offers a more comprehensive security solution tailored to the unique challenges posed by CX platforms.

Ultimately, it is essential for organizations to consider both the technical and business implications of security breaches within CX platforms. Ensuring the accuracy and integrity of data used for business decisions is critical to preventing costly mistakes and safeguarding sensitive information. Conducting regular audits and addressing issues like zombie tokens can help mitigate the risk of breaches and protect against potential threats.

approved attackers hit Organizations platforms SOC
Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
Previous ArticleWhat Is, Is — And Other Lies We Tell Ourselves
Next Article Little Help for Meth Addiction

Related Posts

Motorola Signature Review: The Slimline Flagship

February 19, 2026

What to Expect from Samsung's Galaxy Unpacked Event: Galaxy S26, Galaxy Buds 4 & More

February 19, 2026

OpenAI taps Tata for 100MW AI data center capacity in India, eyes 1GW

February 19, 2026

Dyson’s Slim PencilWash Wet Floor Cleaner Launches Soon

February 19, 2026
Leave A Reply Cancel Reply

Our Picks
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Don't Miss
Psychology

Little Help for Meth Addiction

February 20, 20260

Exploring Pharmacological Treatment for Methamphetamine Abstinence When it comes to addressing methamphetamine use disorder, pharmacological…

How attackers hit 700 organizations through CX platforms your SOC already approved

February 20, 2026

What Is, Is — And Other Lies We Tell Ourselves

February 20, 2026

The Emotional Aftermath of an Adult ADHD Diagnosis

February 20, 2026
About Us
About Us

Explore blogs on mind, spirituality, health, and travel. Find balance, wellness tips, inner peace, and inspiring journeys to nurture your body, mind, and soul.

We're accepting new partnerships right now.

Our Picks

Little Help for Meth Addiction

February 20, 2026

How attackers hit 700 organizations through CX platforms your SOC already approved

February 20, 2026

What Is, Is — And Other Lies We Tell Ourselves

February 20, 2026

Subscribe to Updates

Awaken Your Mind, Nourish Your Soul — Join Our Journey Today!

Facebook X (Twitter) Pinterest YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 mindfortunes.org - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.