Workday, a human resource technology company for more than 11,000 companies and 70 million users worldwide, Declare In unloading the classic Friday news that suffered from data breach. The company did not reveal the amount of information stolen by the infiltrators, but it revealed that the information – including names, email addresses and phone numbers – exposes some users to risk.
The company said that the violation struck some of the databases of customer relations from a third party. If any other data is stolen, the working day is definitely not said. The company only said that there was no indication of access to customer tenants or data “inside these databases. But the working day now is concerned that although its breach may be limited, it may lead to other violations through social engineering attacks.
“The type of information obtained from the actor in the first place was common commercial contact information, such as names, email addresses and phone numbers, which may enhance social engineering fraud,” Working Day wrote.
It is interesting to note the lack of specific information related to the work day provided by the day of breach. The company did not hide completely that the breach had happened, but it also took some time before it was revealed. Bleeping computerThe breach occurred on August 6. Then there These small hot details of TechcrunchThe company’s blog post, which announces the breach of the “NOINDEX brand” in the source code, which indicates the search engine crawls for not indexing the page so that it does not appear in the search results.
This may be a mysteriously understandable decision from the point of view of protection, but it does not cry exactly, “We are doing our best to keep our customers with knowledge and safe.”
According to the Bleeping computerIt seems that the penetration of the working day is part of the larger breach of the salesforce databases, which caught a series of companies in Crossfire. Companies including Adidasand Googleand Qantas airlinesAnd Cisco All of them were struck as part of the Slesforce relationship management systems.
These attacks were linked primarily to Piracy group that passes near ShinyhuntersWhich was reported in most damage through social engineering and voicing attacks. Therefore, it makes sense to warn his customers exactly.
Shinyhunters has become a prolific threat in recent years. AT & T extortion set, Theft of 73 million customer records From the communications giant, and PowerSchoolWhich was at risk the information of millions of students and teachers in the United States and Canada.
https://gizmodo.com/app/uploads/2025/08/GettyImages-2230753536-1200×675.jpg
Source link