Close Menu
TechurzTechurz
    What's Hot

    This young startup is taking on a fragrance industry that hasn’t changed in a almost half century

    May 21, 2026

    Maka Kids is redefining kids’ screen time with a streaming app optimized for well-being, not engagement

    May 21, 2026

    Beauty booking startup Fresha hits $1 billion valuation with KKR backing

    May 21, 2026
    Facebook X (Twitter) Instagram
    Tech Pulse
    • This young startup is taking on a fragrance industry that hasn’t changed in a almost half century
    • Maka Kids is redefining kids’ screen time with a streaming app optimized for well-being, not engagement
    • Beauty booking startup Fresha hits $1 billion valuation with KKR backing
    • General Catalyst just led a $63M bet on India’s travel payments market
    • Clouted wants to take the guesswork out of making short videos go viral
    X (Twitter) Pinterest YouTube LinkedIn WhatsApp
    TechurzTechurz
    • Home
    • Tech Pulse
    • AI Systems
    • Cyber Reality
    • Future Tech
    • Disruption Lab
    • Signals
    TechurzTechurz
    Home - Security - ‘We too were breached,’ says Google, months after revealing Salesforce attacks
    Security

    ‘We too were breached,’ says Google, months after revealing Salesforce attacks

    TechurzBy TechurzAugust 7, 2025No Comments1 Min Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Google offices
    Share
    Facebook Twitter LinkedIn Pinterest Email


    The campaign is attributed to a threat group Google tracks as UNC6040, which, after breaching Salesforce, moves laterally across cloud services, targeting tools like Okta, Microsoft 365, and Workplace to widen the scope of the breach.

    According to David Stuart, cybersecurity Evangelist, Sentra, theft of Google-hosted data makes sense. “This breach is the latest in a string of attacks targeting Salesforce environments, from Qantas to Pandora and now Google,” he said. “It’s a clear signal that attackers are focusing on where data is most concentrated, and often least visible — within cloud SaaS applications.”

    Stolen data is publicly available: Google

    According to the update, the breach is likely to have a minimal impact due to the nature of the stolen data. “The data retrieved by the threat actor was confined to basic and largely publicly available business information, such as business names and contact details,” the update said.

    attacks breached Google months revealing Salesforce
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSamsung Will Reportedly Make iPhone Image Sensors at Texas Facility
    Next Article Microsoft is cautiously onboarding Grok 4 following Hitler concerns
    Techurz
    • Website

    Related Posts

    Opinion

    Ramp in talks to hit $40B+ valuation, 6 months after reaching $32B

    May 7, 2026
    Opinion

    Kalshi doubles valuation in 5 months, hitting $22 billion

    May 7, 2026
    Opinion

    Insurance startup Corgi hits $1.3B valuation 4 months after its Series A

    May 6, 2026
    Add A Comment
    Top Posts

    College social app Fizz expands into grocery delivery

    September 3, 20252,288 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202516 Views

    AI is becoming introspective – and that ‘should be monitored carefully,’ warns Anthropic

    November 3, 202512 Views
    Stay In Touch
    • YouTube
    • WhatsApp
    • Twitter
    • Pinterest
    • LinkedIn
    Latest Reviews

    Techurz is a future-first technology publication covering AI systems, cyber reality, future tech, disruption, and digital signals — written today, searched tomorrow.

    Company:
    • About Us
    • Contact Us
    • Our Authors / Editorial Team
    • Write For Us
    • Advertise
    Policy:
    • Editorial Policy
    • Privacy Policy
    • Terms and Conditions
    • Affiliate Disclosure
    • Cookie Policy
    • Disclaimer
    • DMCA

    Join the Techurz Brief

    The future does not arrive suddenly.
    Get sharp weekly signals on the technologies, risks, tools, and shifts that matter before they become obvious.

    Type above and press Enter to search. Press Esc to cancel.