Company Details
workday
25,257
1,260,364
5112
workday.com
0
WOR_2352830
In-progress

Workday Company CyberSecurity Posture
workday.comWorkday is a leading provider of enterprise cloud applications for finance and human resources, helping customers adapt and thrive in a changing world. Workday applications for financial management, human resources, planning, spend management, and analytics are built with artificial intelligence and machine learning at the core to help organizations around the world embrace the future of work. Workday is used by more than 10,000 organizations around the world and across industries – from medium-sized businesses to more than 50% of the Fortune 500.
Company Details
workday
25,257
1,260,364
5112
workday.com
0
WOR_2352830
In-progress
Between 700 and 749

Workday Global Score (TPRM)XXXX

Description: Workday, a provider of enterprise cloud applications for finance and HR, confirmed it was targeted by a **sophisticated social engineering campaign** via a third-party CRM platform. Threat actors used impersonation tactics (phone calls/texts posing as HR/IT) to deceive employees into surrendering credentials, leading to unauthorized access to the CRM system. The breach exposed **business contact information** (names, emails, phone numbers)—data commonly available but used to fuel further scams. Workday clarified that **no customer data, proprietary systems, or tenant environments were compromised**. The company terminated the unauthorized access, reinforced security measures, and emphasized employee training to mitigate future risks. The incident underscores the vulnerability of third-party vendors and human error in cybersecurity defenses.
Description: Workday confirmed a security breach stemming from a compromise of **Salesloft’s Drift application**, which granted unauthorized access to **customer-facing metadata** within its **Salesforce environment**. The threat actor exploited stolen **OAuth credentials** from Drift to execute targeted search queries in Workday’s Salesforce tenant, exposing non-sensitive data such as **business contact details, support case IDs, tenant attributes (name, data center location), product/service listings, training enrollments, and event logs**. No **file attachments, contracts, financial documents, or sensitive credentials** (e.g., passwords, tokens) were accessed, though Workday is auditing historical case notes for inadvertent disclosures. The attack was **contained to the Salesforce layer** via Drift, with no direct compromise of Workday’s core platform. Customers were advised to **rotate credentials, enforce MFA, and monitor for phishing risks**. The incident highlights third-party integration vulnerabilities and the importance of **OAuth security and access controls** in cloud ecosystems.


Workday has 244.83% more incidents than the average of same-industry companies with at least one recorded incident.
Workday has 159.74% more incidents than the average of all companies with at least one recorded incident.
Workday reported 2 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 2 data breaches, compared to industry peers with at least 1 incident.
Workday cyber incidents detection timeline including parent company and subsidiaries

Workday is a leading provider of enterprise cloud applications for finance and human resources, helping customers adapt and thrive in a changing world. Workday applications for financial management, human resources, planning, spend management, and analytics are built with artificial intelligence and machine learning at the core to help organizations around the world embrace the future of work. Workday is used by more than 10,000 organizations around the world and across industries – from medium-sized businesses to more than 50% of the Fortune 500.

The Facebook company is now Meta. Meta builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further empowered billions around the world. Now, Meta is moving
SS&C is a leading global provider of mission-critical, cloud-based software and solutions for the financial and healthcare industries. Named to the Fortune 1000 list as a top U.S. company based on revenue, SS&C (NASDAQ: SSNC) is a trusted provider to more than 20,000 financial services and healthcar
A problem isn't truly solved until it's solved for all. Googlers build products that help create opportunities for everyone, whether down the street or across the globe. Bring your insight, imagination and a healthy disregard for the impossible. Bring everything that makes you unique. Together, we c
Autodesk is changing how the world is designed and made. Our technology spans architecture, engineering, construction, product design, manufacturing, and media and entertainment. We empower innovators everywhere to solve challenges, big and small. From greener buildings to smarter products and mo
Instacart, the leading grocery technology company in North America, works with grocers and retailers to transform how people shop. The company partners with more than 1,500 national, regional, and local retail banners to facilitate online shopping, delivery and pickup services from more than 85,000

Olá, somos a TOTVS! A maior empresa de tecnologia do Brasil. 🤓 Líder absoluta em sistemas e plataformas para empresas, a TOTVS possui mais de 70 mil clientes. Indo muito além do ERP, oferece tecnologia completa para digitalização dos negócios por meio de 3 unidades de negócio: - Gestão: ERPs, sol

Adhering to the ‘Retail + Technology’ strategy, Meituan commits to its mission that 'We help people eat better, live better'. Since its establishment in March 2010, Meituan has advanced the digital upgrading of services and goods retail on both supply and demand sides. Together with our partners we

HubSpot is a leading CRM platform that provides software and support to help businesses grow better. Our platform includes marketing, sales, service, and website management products that start free and scale to meet our customers’ needs at any stage of growth. Today, thousands of customers around th

The Bosch Group’s strategic objective is to create solutions for a connected life. Bosch improves quality of life worldwide with innovative products and services that are "Invented for life" and spark enthusiasm. Podcast: http://bit.ly/beyondbosch Imprint: https://www.bosch.us/corporate-informatio
.png)
Jackson County Public Schools, in western North Carolina, said classes are canceled on Tuesday due to a cybersecurity issue.
India's second-largest IT services firm, Infosys, on Wednesday, announced a strategic collaboration with Metro Bank, one of the UK's leading...
Workday, Inc. (NASDAQ: WDAY), the enterprise AI platform for managing people, money, and agents, today announced a new AI Centre of...
Workday, Inc. (NASDAQ: WDAY), the enterprise AI platform for managing people, money, and agents, today announced a three-year €175 million...
Microsoft warns of a cybercrime group hijacking U.S. university payrolls exploiting weak MFA and phishing staff credentials.
Schreiber's most significant contributions have been to open standards in the area of real-time cybersecurity.
Microsoft warns of social engineering attacks dubbed “payroll pirates” resulting in lost wages after hackers divert employees' earnings to...
Workday, global enterprise AI platform, plans to set up a new AI Centre of Excellence in Dublin, Ireland - investing EUR 175 million and...
The world of work is changing fast—learn the trends and skills you need to know to stay prepared in your career.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Workday is http://www.workday.com.
According to Rankiteo, Workday’s AI-generated cybersecurity score is 739, reflecting their Moderate security posture.
According to Rankiteo, Workday currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Workday is not certified under SOC 2 Type 1.
According to Rankiteo, Workday does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Workday is not listed as GDPR compliant.
According to Rankiteo, Workday does not currently maintain PCI DSS compliance.
According to Rankiteo, Workday is not compliant with HIPAA regulations.
According to Rankiteo,Workday is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Workday operates primarily in the Software Development industry.
Workday employs approximately 25,257 people worldwide.
Workday presently has no subsidiaries across any sectors.
Workday’s official LinkedIn profile has approximately 1,260,364 followers.
Workday is classified under the NAICS code 5112, which corresponds to Software Publishers.
Yes, Workday has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/workday.
Yes, Workday maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/workday.
As of December 11, 2025, Rankiteo reports that Workday has experienced 2 cybersecurity incidents.
Workday has an estimated 27,532 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with terminated unauthorized access to third-party crm, and remediation measures with enhanced security awareness training, remediation measures with additional security controls, and communication strategy with public disclosure, communication strategy with customer reassurance via trusted channels, communication strategy with security awareness reinforcement, and and and third party assistance with independent forensic firm (unnamed), third party assistance with collaboration with salesloft, and containment measures with disabled drift connector, containment measures with revoked all associated oauth tokens, containment measures with removed residual integrations, and remediation measures with full audit of historical case text for credential disclosures, remediation measures with customer notifications for credential rotation, and communication strategy with direct customer notifications, communication strategy with public advisory via workday and salesloft trust portals, communication strategy with detailed mfa/step-up authentication guidance, and enhanced monitoring with user activity logs for unusual behavior (recommended to customers)..
Title: Unauthorized Access to Workday’s Salesforce Environment via Compromised Drift Application
Description: Workday confirmed that a compromise of Salesloft’s Drift application led to unauthorized access to customer-facing data and basic case information within its Salesforce environment. The threat actor exploited Drift’s OAuth credentials to perform targeted search queries in Workday’s Salesforce tenant. Exposed data included non-sensitive metadata such as business contact details, support case identifiers, tenant attributes, product listings, training enrollments, and event logs. No file attachments, contracts, or sensitive documents were accessed. Workday disabled the Drift connector, revoked OAuth tokens, and engaged a forensic firm for investigation. Customers were advised to rotate credentials and enforce multi-factor authentication (MFA).
Date Publicly Disclosed: 2024-08-26
Type: Data Breach
Attack Vector: Compromised Third-Party Application (Drift)OAuth Credential AbuseTargeted Search Queries in Salesforce
Vulnerability Exploited: Weak OAuth Credential Security in DriftLack of Multi-Factor Authentication (MFA) for Third-Party Integrations
Threat Actor: Sophisticated Threat Actor (unknown affiliation)
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Third-Party CRM Platform (via Compromised Employee Credentials) and Compromised OAuth credentials in Salesloft’s Drift application.

Data Compromised: Business contact details, Support case identifiers, Tenant attributes (name, data center location), Product and service listings, Training course enrollments with certificates, Event logs
Systems Affected: Workday’s Salesforce tenant (via Drift integration)
Operational Impact: Forensic investigationCredential rotation for affected customersAudit of historical case text for inadvertent disclosures
Brand Reputation Impact: Potential erosion of trust due to third-party vulnerabilityProactive customer notifications and advisory issuance
Identity Theft Risk: ['Low (no PII or sensitive credentials confirmed exposed)']
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Business Contact Information, , Non-Sensitive Metadata, Business Operational Data and .

Entity Name: Workday
Entity Type: Enterprise Software Provider
Industry: Human Capital Management (HCM) and Financial Management
Location: Global (HQ: Pleasanton, California, USA)
Size: Large (10,000+ employees)
Customers Affected: Customers who shared credentials via Salesforce cases (exact number unspecified)

Entity Name: Salesloft (Drift application provider)
Entity Type: Third-Party Vendor
Industry: Sales Engagement and Conversational Marketing
Location: Global (HQ: Atlanta, Georgia, USA)

Incident Response Plan Activated: True
Third Party Assistance: Independent Forensic Firm (Unnamed), Collaboration With Salesloft.
Containment Measures: Disabled Drift connectorRevoked all associated OAuth tokensRemoved residual integrations
Remediation Measures: Full audit of historical case text for credential disclosuresCustomer notifications for credential rotation
Communication Strategy: Direct customer notificationsPublic advisory via Workday and Salesloft trust portalsDetailed MFA/step-up authentication guidance
Enhanced Monitoring: User activity logs for unusual behavior (recommended to customers)
Third-Party Assistance: The company involves third-party assistance in incident response through Independent forensic firm (unnamed), Collaboration with Salesloft, .

Type of Data Compromised: Non-sensitive metadata, Business operational data
Sensitivity of Data: Low (no PII, financial data, or sensitive documents)
File Types Exposed: Text-based case notesEvent logsTraining enrollment records
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Enhanced Security Awareness Training, Additional Security Controls, , Full audit of historical case text for credential disclosures, Customer notifications for credential rotation, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by terminated unauthorized access to third-party crm, , disabled drift connector, revoked all associated oauth tokens, removed residual integrations and .

Lessons Learned: Third-party integrations (e.g., OAuth-based apps) introduce significant risk vectors., Proactive monitoring of anomalous activity in SaaS environments is critical., Regular audits of case text and support logs can mitigate inadvertent credential exposure., Multi-factor authentication (MFA) and step-up authentication are essential for high-privilege operations.

Recommendations: Rotate all credentials shared via Salesforce cases., Enforce MFA across all user accounts, especially for third-party integrations., Implement step-up authentication for high-privilege operations., Conduct phishing awareness training and simulated assessments., Monitor user activity logs for unusual behavior., Verify independent impact assessments for direct Drift customers., Follow Salesloft’s supplemental security guidance for Drift ecosystem hardening.Rotate all credentials shared via Salesforce cases., Enforce MFA across all user accounts, especially for third-party integrations., Implement step-up authentication for high-privilege operations., Conduct phishing awareness training and simulated assessments., Monitor user activity logs for unusual behavior., Verify independent impact assessments for direct Drift customers., Follow Salesloft’s supplemental security guidance for Drift ecosystem hardening.Rotate all credentials shared via Salesforce cases., Enforce MFA across all user accounts, especially for third-party integrations., Implement step-up authentication for high-privilege operations., Conduct phishing awareness training and simulated assessments., Monitor user activity logs for unusual behavior., Verify independent impact assessments for direct Drift customers., Follow Salesloft’s supplemental security guidance for Drift ecosystem hardening.Rotate all credentials shared via Salesforce cases., Enforce MFA across all user accounts, especially for third-party integrations., Implement step-up authentication for high-privilege operations., Conduct phishing awareness training and simulated assessments., Monitor user activity logs for unusual behavior., Verify independent impact assessments for direct Drift customers., Follow Salesloft’s supplemental security guidance for Drift ecosystem hardening.Rotate all credentials shared via Salesforce cases., Enforce MFA across all user accounts, especially for third-party integrations., Implement step-up authentication for high-privilege operations., Conduct phishing awareness training and simulated assessments., Monitor user activity logs for unusual behavior., Verify independent impact assessments for direct Drift customers., Follow Salesloft’s supplemental security guidance for Drift ecosystem hardening.Rotate all credentials shared via Salesforce cases., Enforce MFA across all user accounts, especially for third-party integrations., Implement step-up authentication for high-privilege operations., Conduct phishing awareness training and simulated assessments., Monitor user activity logs for unusual behavior., Verify independent impact assessments for direct Drift customers., Follow Salesloft’s supplemental security guidance for Drift ecosystem hardening.Rotate all credentials shared via Salesforce cases., Enforce MFA across all user accounts, especially for third-party integrations., Implement step-up authentication for high-privilege operations., Conduct phishing awareness training and simulated assessments., Monitor user activity logs for unusual behavior., Verify independent impact assessments for direct Drift customers., Follow Salesloft’s supplemental security guidance for Drift ecosystem hardening.
Key Lessons Learned: The key lessons learned from past incidents are Human element remains a critical vulnerability in cybersecurity.,Third-party vendors can serve as attack vectors for breaching primary targets.,Social engineering tactics (e.g., impersonation via phone/SMS) are increasingly sophisticated.,Proactive employee training and awareness are essential to mitigate phishing risks.Third-party integrations (e.g., OAuth-based apps) introduce significant risk vectors.,Proactive monitoring of anomalous activity in SaaS environments is critical.,Regular audits of case text and support logs can mitigate inadvertent credential exposure.,Multi-factor authentication (MFA) and step-up authentication are essential for high-privilege operations.

Source: Workday Security Advisory

Source: Salesloft Trust Portal Update (August 26, 2024)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Workday Official StatementUrl: https://www.workday.com/en-us/company/trust/security-trust.html, and Source: Workday Security Advisory, and Source: Salesloft Trust Portal Update (August 26, 2024).

Investigation Status: Ongoing (forensic analysis and customer audits in progress)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Disclosure, Customer Reassurance Via Trusted Channels, Security Awareness Reinforcement, Direct Customer Notifications, Public Advisory Via Workday And Salesloft Trust Portals and Detailed Mfa/Step-Up Authentication Guidance.

Stakeholder Advisories: Direct Notifications To Affected Customers, Public Guidance On Mfa And Credential Rotation.
Customer Advisories: Rotate credentials transmitted via Salesforce cases.Audit historical case text for sensitive data.Enforce MFA and step-up authentication.Review Drift integration configurations (if applicable).
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Workday Reassured Customers That No Proprietary Data Or Tenant Environments Were Compromised., Emphasized The Importance Of Verifying Communication Channels Before Sharing Sensitive Information., Customers Were Directed To Workday’S Security And Trust Webpage For Updates., Reminder: Workday Will Never Request Passwords Or Secure Details Via Phone., , Direct Notifications To Affected Customers, Public Guidance On Mfa And Credential Rotation, Rotate Credentials Transmitted Via Salesforce Cases., Audit Historical Case Text For Sensitive Data., Enforce Mfa And Step-Up Authentication., Review Drift Integration Configurations (If Applicable). and .

Entry Point: Compromised OAuth credentials in Salesloft’s Drift application
High Value Targets: Workday’S Salesforce Tenant, Customer Support Case Data,
Data Sold on Dark Web: Workday’S Salesforce Tenant, Customer Support Case Data,

Root Causes: Insufficient Protection Of Drift’S Oauth Credentials By Salesloft., Lack Of Granular Access Controls For Third-Party Integrations In Salesforce., Potential Over-Reliance On Single-Factor Authentication For High-Risk Operations.,
Corrective Actions: Disabling Vulnerable Drift Connector And Revoking Oauth Tokens., Engaging Forensic Firm For Comprehensive System Review., Issuing Customer Advisories For Credential Rotation And Mfa Enforcement., Publishing Detailed Guidance For Authentication Hardening.,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Independent Forensic Firm (Unnamed), Collaboration With Salesloft, , User Activity Logs For Unusual Behavior (Recommended To Customers), .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Terminated Unauthorized Access To The Crm System., Enhanced Employee Training On Social Engineering Tactics., Implemented Additional Security Measures (Details Undisclosed)., Reinforced Communication Policies To Prevent Credential Harvesting., , Disabling Vulnerable Drift Connector And Revoking Oauth Tokens., Engaging Forensic Firm For Comprehensive System Review., Issuing Customer Advisories For Credential Rotation And Mfa Enforcement., Publishing Detailed Guidance For Authentication Hardening., .
Last Attacking Group: The attacking group in the last incident was an Sophisticated Threat Actor (unknown affiliation).
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-08-26.
Most Significant Data Compromised: The most significant data compromised in an incident were Business Contact Information (Names, Email Addresses, Phone Numbers), , Business contact details, Support case identifiers, Tenant attributes (name, data center location), Product and service listings, Training course enrollments with certificates, Event logs and .
Most Significant System Affected: The most significant system affected in an incident was Third-Party CRM Platform and Workday’s Salesforce tenant (via Drift integration).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was independent forensic firm (unnamed), collaboration with salesloft, .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Terminated Unauthorized Access to Third-Party CRM and Disabled Drift connectorRevoked all associated OAuth tokensRemoved residual integrations.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Business contact details, Product and service listings, Event logs, Support case identifiers, Tenant attributes (name, data center location), Business Contact Information (Names, Email Addresses, Phone Numbers) and Training course enrollments with certificates.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Multi-factor authentication (MFA) and step-up authentication are essential for high-privilege operations.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Rotate all credentials shared via Salesforce cases., Implement step-up authentication for high-privilege operations., Conduct phishing awareness training and simulated assessments., Adopt behavioral analytics to detect anomalous access patterns in real-time., Follow Salesloft’s supplemental security guidance for Drift ecosystem hardening., Reinforce communication policies (e.g., never request passwords via phone/SMS)., Enhance employee training programs to recognize and report social engineering attempts (e.g., phishing, impersonation)., Monitor user activity logs for unusual behavior., Regularly audit third-party vendor security practices and access controls., Enforce MFA across all user accounts, especially for third-party integrations., Implement multi-factor authentication (MFA) for all critical systems, including third-party platforms., Verify independent impact assessments for direct Drift customers. and Monitor dark web/underground forums for signs of stolen credentials or exposed data..
Most Recent Source: The most recent source of information about an incident are Workday Security Advisory, Workday Official Statement, Salesloft Trust Portal Update (August 26 and 2024).
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.workday.com/en-us/company/trust/security-trust.html .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Resolved (Unauthorized Access Terminated; Additional Security Measures Implemented).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Workday reassured customers that no proprietary data or tenant environments were compromised., Emphasized the importance of verifying communication channels before sharing sensitive information., Direct notifications to affected customers, Public guidance on MFA and credential rotation, .
Most Recent Customer Advisory: The most recent customer advisory issued were an Customers were directed to Workday’s Security and Trust webpage for updates.Reminder: Workday will never request passwords or secure details via phone. and Rotate credentials transmitted via Salesforce cases.Audit historical case text for sensitive data.Enforce MFA and step-up authentication.Review Drift integration configurations (if applicable).
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Compromised OAuth credentials in Salesloft’s Drift application and Third-Party CRM Platform (via Compromised Employee Credentials).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Successful social engineering attack exploiting human trust.Inadequate verification of unsolicited communication (phone/SMS).Potential gaps in third-party vendor security controls., Insufficient protection of Drift’s OAuth credentials by Salesloft.Lack of granular access controls for third-party integrations in Salesforce.Potential over-reliance on single-factor authentication for high-risk operations..
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Terminated unauthorized access to the CRM system.Enhanced employee training on social engineering tactics.Implemented additional security measures (details undisclosed).Reinforced communication policies to prevent credential harvesting., Disabling vulnerable Drift connector and revoking OAuth tokens.Engaging forensic firm for comprehensive system review.Issuing customer advisories for credential rotation and MFA enforcement.Publishing detailed guidance for authentication hardening..
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.