Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Widespread Salesforce Data Theft via Compromised Salesloft Drift OAuth Tokens

On August 20, 2025, Salesloft published an advisory describing a security issue potentially affecting the Salesloft Drift integration with Salesforce. On August 26, Google Threat Intelligence Group (GTIG) provided additional details about the campaign, in which a threat actor known as UNC6395 authenticated against Salesforce customer instances using compromised OAuth tokens tied to the Salesloft Drift integration with Salesforce.

The Role of AI in Endpoint Security

One can’t discuss the modern state of endpoint security without mentioning a term that has quickly become ubiquitous with security solutions: artificial intelligence (AI). With a constantly evolving threat landscape and many security challenges plaguing organizations (e.g sprawling attack surfaces, monitoring and continuity gaps, alert overload, and limited resources), it’s clear that endpoint security must evolve as well, and the most-promising advancement is AI.

GitGuardian MCP Sever - Example Use Cases and Installation

In this video, learn how to set up and use GitGuardian’s new MCP (Model Context Protocol) server to bring secrets security and Non-Human Identity (NHI) governance directly into your AI-powered IDE, like Cursor or Claude Desktop. GitGuardian Developer Advocate Dwayne McDaniel shows how to install the MCP server and run real use cases—like scanning for secrets, listing incidents, and creating honeytokens—all from inside your coding environment. Ready to embed security where code is written?

China's Cyber Strategy Exposed

Chinese cyber operations aren’t random hacks; they are part of a broader geopolitical competition for information, economic advantage, and strategic influence. Every operation ties back to China’s long-term national objectives. Mei Danowski, Co-Founder of Natto Thoughts Online Publication, explains how these attacks serve national objectives and why cybersecurity defenders must adapt.

Why Protecto Chose SingleStore as Part of GPTGuard's Architecture

Traditional RAG creates risk. In enterprise AI, accuracy and security aren’t optional. Most vector-only databases are built for speed, but they ignore enterprise realities like security and compliance. Without context, access controls, or accurate recall, they create compliance gaps that make AI unsafe for regulated industries. At Protecto, we built GPTGuard to change that — making enterprise AI safe by preventing data leaks, enforcing privacy, and keeping compliance intact.

How to Compress Video Online Without Losing Quality? [Free Methods]

In today's digital world, video content has become one of the most popular sources of entertainment. Thanks to high-speed internet and powerful devices, it has now become very easy and quick to download and save these video files. But downloading high-resolution videos often comes with a challenge: large file size. Oversized video content can cause problems when uploading it to YouTube, sharing it on WhatsApp, or storing it anywhere, including your Google Drive.