Google Salesforce data breach places more than two billion users in the risk of hunting

Photo of author

By [email protected]


newYou can now listen to Fox News!

The technology leader like Google is often invincible when it comes to Cyber ​​security attacksBut this is not the case. Earlier this month, the research giant confirmed that the attackers had reached one of the Salesforce counterparts. According to a Google spokesman, this system has largely stored basic business information, such as communication details and notes from small and medium -sized companies. Google Cloud’s customer or consumer products such as Gmail, Drive or Calendar have not been stored.

Google says she ended the harmful activity, completed an influence analysis, and made a mitigation. Therefore, no other procedure is required.

New Google Ai makes robots smarter without cloud

Subscribe to the free Cyberguy report
Get my best technical advice, urgent safety alerts, and exclusive deals that are connected directly to your inbox. In addition, you will get immediate access to the ultimate survival guide – for free when joining my country Cyberguy.com/newsledter

A man in the computer code stares on Hiis Monitor in a dark room, with a ring light that is reflected on the screen and canned drinks open next to it.

CYBERCRIMINALs takes advantage of the Slesforce data from Google to launch Vishing and Hepesheshesits against Gmail users all over the world. (Cyberguy “Knutsson)

Vishing Fishing targets Gmail users

According to the infiltrators, the infiltrators reached the Google Slesforce database systems, exposing customer and companies. Google confirmed the incident He explained that the information was mostly public business contact data and did not include passwords or payment information. The company confirmed that the breach has only affected the Slesforce system, not Gmail or Google Cloud accounts.

However, the attackers use the breach news to support deception and fragmentation, which deceives people to give up sensitive information. According to PC World, some users have already reported an increase in hunting attempts that indicate Google services.

Google is prevented from following each step

One of the main tactics includes fraud phone calls, also known as Vishing. The most prominent Reddit publication is a wave of calls coming from the 650th region code, which is linked to the Google headquarters. In these calls, fraudsters appear as Google employees and warn of supposed security breach victims. Then they direct users to reset and share their Gmail password. This closes the legitimate owner of the account and gives the attacker full control.

Gmail download screen.

The user runs Gmail. (Cyberguy “Knutsson)

The old infrastructure used as “hanging buckets”

Separately from the Salesforce accident, Google Cloud customers also face another type of attack. Holders try to exploit old access addresses using a method called the contestants bucket. This can allow them to inject harmful programs or steal data. Both companies and individuals are vulnerable to losing control of sensitive information if targeted in this way.

Gmail Google Cloud serves approximately 2.5 billion people, making the risk size important. Although the initial breach did not display passwords, the attackers use the accident news to deceive people to reveal their login details.

Google Home page

Google search window is located on a laptop. (Cyberguy “Knutsson)

6 ways you can stay safe from fraudsters targeting Google accounts

Google accounts are often a major target for deception. The good news is that protecting yourself does not require advanced technical skills. Some practical steps can significantly reduce your chances of becoming a victim.

1) Avoid clicking on hunting links

Hanging is still the most common way for deceptions stealing a Google account accreditation data. It may claim an e -mail or a fake text that your account has been closed or you need to verify suspicious activity. Usually, click the link to the fake login page that looks almost identical with the real Google login screen.

To avoid falling into these tricks, check the sending of the sender carefully, move it on the links before clicking, and avoid entering the Google password on any page that does not start with Accounts.google.com.

The best way to protect yourself from malicious links that prove harmful programs, which may reach your own information, is to install antivirus program on all your devices. This protection can also be alerted to relieving emails and fraud on Ransomwari, and maintaining your personal information and digital assets.

Get the best winners to protect antivirus 2025 for Windows, Mac and Android & iOS devices on Cyberguy.com/lockupyourtch

2) Save passwords safely

The re -use of weak passwords through multiple sites is an open invitation to the scammers. If one site is violated, Google account It becomes weak. A strong and unique password is the first defense line.

The easiest way to manage this with the password manager. It can generate complex passwords, store them safely, and fill them automatically when needed. In this way, you never have to remember dozens of different login operations, and the attackers cannot guess their way.

Next, know whether your email has been shown in previous violations. Choose Pass Director No. 1 for us (see Cyberguy.com/passwords) An integrated scanner includes whether your email address or passwords have appeared in a known leak. If you discover a match, change any passwords immediately and secure these accounts with new and unique credentials.

Check the best password managers reviewed by experts in 2025 in Cyberguy.com/passwords

What do you do if you get an email to reset the password you did not request

3) Delete the personal data that endangers you

Budgets often use the information they find online to formulate convincing attacks. If your email address, phone number, or even previous passwords float on data mediation sites, criminals have more tools to impersonate or deceive you to reveal more.

Using a data removal service helps clean digital fingerprint. By reducing the amount of open information about you, it becomes difficult for the fraudsters to target you directly.

Although there is no service that ensures the complete removal of your data from the Internet, the data removal service is really a smart choice. It is not cheap, nor is it your privacy. These services do all work for you through effective monitoring and systematically erasing your personal information from hundreds of websites. This gives me peace of mind and has proven to be the most effective way to erase your personal data from the Internet. By reducing the available information, you reduce the risk of referring to the cross -cut data from the violations of information that they may find on the dark web, making it difficult for them to target you.

Check the best data removal services and get a free check to see if your personal information is already on the web through the visit Cyberguy.com/Delete

Get a free examination to see if your personal information is already on the web: Cyberguy.com/freescan

4) Run bilateral approval

Even the most powerful password can be stolen, however Dual factors authentication (2FA) It adds an additional barrier. When enabling, Google will order a single -time symbol or router on your phone before granting access. This means even if you can get your password, they will not be able to log in without your device as well.

Google offers several 2FA methods, from short messages symbols to application -based claims and even devices safety keys. For best protection, choose the application or devices instead of text messages.

5) Keep update your devices

Many frauds depend on the exploitation of old programs. If your phone, browser, or operating system is not updated, attackers may use known weaknesses to install harmful programs or kidnap your session.

Adjust your devices on Update automatically Whenever possible. This ensures that you are always running the latest safety corrections, which reduces the number of holes that the deception can use.

6) Regularly check Google Safety settings

Google provides integrated tools to help users discover suspicious activity. By visiting your Google account safety page, you can see the devices recorded, the last account activity, and whether the recovery options are like your phone number and updated e -mail.

Only a few minutes, it takes a few minutes and gives you a clear overview of any weaknesses. Think about it as a healthy examination of your digital life.

Click here to get the Fox News app

Court Kisa Curt

The accident is a reminder that even technology giants with extensive resources are not immune to security lapses. Although Google insists that passwords have not been revealed, the fraud, deception and deception shows how quickly criminals can make partial leaks. What began as a breach of work data has risen to a threat facing millions of ordinary users, which raised questions about the ecosystem of Google’s ecosystem.

Do you think that the organizers should interfere in more strict rules of how cloud service providers deal with safety rolls? Let’s know through writing to us in Cyberguy.com/contact

Subscribe to the free Cyberguy report
Get my best technical advice, urgent safety alerts, and exclusive deals that are connected directly to your inbox. In addition, you will get immediate access to the ultimate survival guide – for free when joining my country Cyberguy.com/newsledter

Copyright 2025 Cyberguy.com. All rights reserved.



https://static.foxnews.com/foxnews.com/content/uploads/2025/08/google-hardware-event.jpg

Source link

Leave a Comment