Technology ❯ Cybersecurity ❯ Indicators of Compromise
User Agent Strings
Investigators say attackers abused a third-party app to obtain OAuth access, and customers are being directed to Salesforce logs to validate impact.