Pantropic Newsletter #47

Posted September 17, 2025

by Sarah



 

 




Pantropic Newsletter #47 (August 2025)

Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks

 

Attackers just proved how dangerous third-party integrations can be: by compromising Salesloft’s Drift app, they stole OAuth tokens and slipped directly into Salesforce environments, running queries to harvest AWS keys, Snowflake tokens, and even passwords hidden in support cases. The breach underscores a brutal reality – your Salesforce data is only as secure as the apps you connect, and default trust in integrations is now a liability. Revoking tokens and rotating credentials is just the start; without a stronger governance strategy for connected apps, you’re leaving the door wide open. If your Salesforce environment is critical to your business, now is the time to rethink how you secure it. Let’s have a conversation about how Pantropic can help you harden integrations, pass security audits, and keep attackers out.

(Source: Salesforce)

LEARN MORE INFO

Google confirms data breach – notifying users affected by the cyberattack

 

Even the most advanced companies aren’t immune to simple mistakes. Google has confirmed a data breach after an employee file was accidentally sent to the wrong recipient. While the company reports no misuse of the data, the incident is a stark reminder that human error remains one of the most common causes of breaches. If a global leader like Google can slip, any organization can. Relying solely on firewalls and compliance checklists isn’t enough, sensitive information such as payroll, contracts, or client records could be exposed with just one misdirected email. We’ve worked with organizations to implement safeguards that catch these issues before they escalate. Strengthen your controls before a minor mishap turns into your next headline.

(Source: Cybersecurity News)

LEARN MORE INFO

Hackers bypass Microsoft Defender to install ransomware

 

Security researchers have discovered a serious new threat: attackers are bypassing Microsoft Defender, the tool many organizations rely on as their first line of defense, to deploy ransomware directly onto PCs. Cybercriminals are refining these techniques and scaling them across multiple targets; this isn’t an isolated case. If your strategy depends only on default protections, you may be leaving critical gaps exposed. Defender is an important layer, but it can’t stand alone against increasingly sophisticated attacks. We’ve seen how costly it is when businesses assume baseline security is enough. A layered defense is the difference between shutting down an attack at the door or watching it spread across your network unchecked.

(Source: Mashable)

LEARN MORE INFO

Microsoft warning—do not update windows until you read this

 

Microsoft has taken the unusual step of warning users to pause before applying a recent Windows update after reports surfaced of systems becoming unstable or unusable. For businesses, the lesson goes beyond one faulty patch: updates should never be applied on autopilot. While updates are designed to improve security, they can also disrupt operations if there isn’t a strategy for testing, rollback, or redundancy in place. We’ve seen organizations sidelined for days when routine patches caused unexpected outages. Treat patching as a risk management exercise and you’ll avoid turning a security measure into an operational setback.

(Source: Forbes)

LEARN MORE INFO

Asian orgs shift cybersecurity requirements to suppliers

 

Third-party risk is no longer a back-office concern—it’s now the front line of whether you win or lose business. With over 70% of breaches in Asia tied to suppliers, major organizations are enforcing strict Third Party Risk Management (TPRM) standards, even dropping vendors who fail scans or certifications. That means your customers may soon demand proof of compliance before they sign or renew a contract. If you can’t demonstrate security maturity, you risk being cut off entirely. Businesses lose deals not because of product quality, but because they couldn’t pass a client’s TPRM. Don’t let that be you and strengthen your compliance posture now so you stay on the right side of your customers’ trust.

(Source: Dark Reading)

LEARN MORE INFO

To view our past newsletter editions, click here. 

Backup and Cybersecurity Solutions Offered by Pantropic

ATEGO® ENTERPRISE
This “white glove” managed service is the next generation secure offsite backup you need right now. We monitor your backups daily, help you troubleshoot any problems, and can assist you with restorations when you need it. Our Data Security Module can perform bi-directional anti-malware scans, content disarm and reconstruction (CDR), and protect your backups with biometric Deep MFA and multi-person workflow, crucial in stopping stolen credential attacks.

CROWDSTRIKE FALCON
A next-generation endpoint protection platform using AI and machine learning to effectively stop breaches including true NGAV, endpoint detection and response (EDR), threat intelligence management and automation.

Leading desktop and laptop backup solution providing automated and continuous data backup protection with unlimited capacity backup licensing and flexible deployment options. 
World’s largest security awareness training platform with simulated phishing attacks, educating and empowering employees to strengthen IT security against cybercriminals.
GET IN TOUCH

Copyright © 2023 Pantropic Online Pte Ltd. All rights reserved.