company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

API

loading..
loading..
loading..

TotalEnergies Breach Grows 105x, 22 Million Records Exposed by API Flaws

Energy giant faces unprecedented cyber escalation as threat actors target API infrastructure, highlighting urgent need for automated security solutions

04-Jun-2025
4 min read

No content available.

Related Articles

loading..

Chess

Chesscom confirms data breach via third-party app affecting 4,500 users, raising...

In June 2025, Chess.com, the world’s largest online chess platform with more than 150 million registered members, disclosed a **data breach that impacted just over 4,500 users**. On the surface, the breach appears minimal—barely 0.003% of its user base. Yet the details reveal something far more important than raw numbers: the enduring fragility of third-party integrations in modern digital ecosystems. The breach occurred through a **third-party file transfer application**, a category of software that has repeatedly served as an entry point for attackers in incidents such as MOVEit, Accellion, and GoAnywhere. According to Chess.com, the intrusion window spanned from **June 5 through June 18**, with detection occurring on **June 19**. While the company acted quickly to contain the incident, investigate with the help of forensic experts, and notify federal law enforcement, the event underscores how external dependencies continue to expand the attack surface. ### What Was Exposed The compromised dataset consisted of **Personally Identifiable Information (PII)**, such as user names and identifiers. Importantly, there was no exposure of payment data or direct access to Chess.com’s core platform infrastructure. As of this writing, there is no evidence that the data has been circulated publicly or weaponized. Still, the availability of even limited PII can provide attackers with building blocks for **credential stuffing campaigns, phishing operations, and social engineering against affected individuals**. ### A Praiseworthy but Imperfect Response To Chess.com’s credit, the organization demonstrated maturity in its **incident response posture**. Detection occurred relatively quickly compared to industry averages, where intrusions often linger for months undetected. Users were informed transparently, regulators were notified where applicable, and remediation was tangible: affected accounts were offered **one to two years of identity theft protection and credit monitoring services**. This level of transparency and speed contrasts favorably with the often opaque or delayed disclosures that characterize breaches in other industries. From a crisis management perspective, Chess.com earns high marks. However, praise must be tempered with realism. Credit monitoring is **inherently reactive**, offering a safety net after the fact rather than addressing the structural vulnerabilities that allowed the breach to occur in the first place. ### Supply-Chain Fragility What makes this breach consequential is not the scale but the **pattern it reinforces**. Third-party service providers—file transfer applications in particular—remain a **systemic risk multiplier**. Organizations may enforce rigorous controls internally, but the moment sensitive data crosses into an external platform, it inherits that vendor’s security posture. CISOs and CSOs recognize this problem all too well: * **Vendor risk assessments are often point-in-time, not continuous.** * **Telemetry from external systems rarely integrates into enterprise SIEM or SOAR pipelines.** * **Data minimization is inconsistently applied**, allowing PII to sit unnecessarily in vendor systems. In Chess.com’s case, the reliance on a file transfer service that became a breach vector mirrors the exact weaknesses exploited in the MOVEit and Accellion campaigns. For attackers, supply-chain nodes remain high-yield targets because they aggregate data across multiple clients and often lack the hardened defenses of primary enterprise infrastructure. ### Strategic Implications While the breach is small in numerical terms, it still carries **regulatory obligations under GDPR, CCPA, and other privacy frameworks**. The exposure of PII, even at limited scale, triggers compliance scrutiny. With the acceleration of **AI-driven privacy regulation** worldwide, enterprises are expected to enforce not just internal safeguards but **continuous oversight of vendor ecosystems**. From a governance standpoint, this raises difficult questions: **where does liability begin and end when the compromise originates from a vendor environment?** Boards and executive security leaders will need to scrutinize contract language, indemnification clauses, and—more importantly—risk tolerance for third-party dependencies. ### Final Analysis Chess.com’s handling of this incident was, by most measures, **effective and transparent**. But it would be misleading to frame the response as flawless. The real takeaway is that **even well-managed platforms remain vulnerable when their security is chained to external vendors**.

loading..   04-Sep-2025
loading..   4 min read
loading..

DDoS Attack

Cloudflare auto-mitigated a record 11.5 Tbps UDP flood from Google Cloud in 35s ...

Cloudflare says it has automatically blocked the largest volumetric DDoS attack ever observed, a **UDP flood that spiked to 11.5 terabits per second** and **lasted \~35 seconds**. The company added that the traffic **mostly originated from Google Cloud** and arrived amid **“hundreds” of hyper-volumetric attacks** seen in recent weeks. *(Note: despite the article slug reading “115,” the reported peak is **11.5** Tbps.)* ## Why this is historic At **11.5 Tbps**, the new peak surpasses Cloudflare’s **7.3 Tbps** record disclosed in June 2025 and the **3.8 Tbps** bar set in October 2024. Microsoft previously reported a **3.47 Tbps** mitigation in 2022. The fresh milestone shows attack capacity is still climbing, fast. ## Anatomy of the blast * **Vector:** **UDP flood** (bandwidth-saturating, connectionless packets). * **Burstiness:** **\~35s** duration, consistent with recent short, high-intensity “hyper-volumetric” surges. * **Scale:** Cloudflare noted **peaks of 5.1 Bpps** (billions of packets per second) alongside **11.5 Tbps** during the recent wave. * **Source profile:** “Mainly” from **Google Cloud**—typical of today’s DDoS where abused cloud instances can marshal enormous, transient firepower. ## How Cloudflare absorbed it—at wire speed Cloudflare’s mitigation is **autonomous and distributed**. Each edge server runs the in-house **`dosd`** (denial-of-service daemon) for instant detection and filtering, complemented by **`flowtrackd`** for stateful protection of complex flows. Decisions happen at the edge without centralized consensus, cutting reaction times to seconds. The scale rides on a **405 Tbps Anycast network** designed to soak bandwidth floods before they localize impact. ## The broader trend: hyper-volumetric is the new normal Cloudflare’s recent threat reports chart an aggressive rise in volumetric events. In **Q2 2025**, it recorded **the then-largest 7.3 Tbps** and **4.8 Bpps** attacks while blocking **6,500+ hyper-volumetric** events that quarter. Earlier, Cloudflare tallied **21.3 million** DDoS mitigations across **2024** and **20.5 million** in **Q1 2025** alone, including **6.6 million** strikes directly against its own backbone in an **18-day** multi-vector campaign. The new 11.5 Tbps spike extends that arc. ## How it compares—recent records at a glance * **Sep 2025:** **11.5 Tbps** UDP flood, mostly from Google Cloud; \~35s. * **May/Jun 2025:** **7.3 Tbps** attack on a hosting provider; \~45s; largely UDP; “carpet-bombing” across many ports. * **Oct 2024:** **3.8 Tbps / \~65s** hyper-volumetric L3/4 campaign. * **Jan 2022:** **3.47 Tbps** on an Azure customer (Microsoft). ## What this means for defenders (actionable takeaways) 1. **Assume bursts, not sieges.** Modern floods compress devastating throughput into sub-minute windows; tune detection & alerting for **seconds-level** granularity. 2. **Push filtering to the edge.** On-prem scrubbing alone can be too late. Prefer **always-on, autonomous mitigation** with global Anycast capacity. 3. **Harden UDP exposure.** Inventory UDP services, restrict to business-critical ports, and apply **stateless filters / rate limits** close to ingress. 4. **Spoofing resistance upstream.** Work with ISPs and cloud partners on **ingress filtering** and abuse handling to blunt reflection/amplification potential. *(Industry best practice; aligns with provider guidance.)* 5. **Exercise runbooks for 30–60s shocks.** Simulate hyper-volumetric bursts to validate telemetry, auto-mitigation, and comms in the first minute. ## Open questions we’re watching * **Victim & motive:** The target of the 11.5 Tbps surge wasn’t named; attribution and motive remain unconfirmed. * **Abuse pathways in cloud:** How attackers marshalled such momentary scale from Google Cloud—and what countermeasures follow—will shape future resilience. ## Bottom line The 11.5 Tbps peak is a **step-change, not a blip**. Short, furious floods launched from powerful cloud footprints are redefining DDoS economics. Cloudflare’s autonomous edge and massive Anycast backbone proved decisive this time; everyone else should calibrate defenses to **match the new tempo**.

loading..   02-Sep-2025
loading..   4 min read
loading..

Supply Chain Attack

Zscaler warns of support-case and contact data exposure after Salesloft Drift br...

Zscaler has disclosed a data breach affecting its Salesforce environment after attackers exploited the compromise of Salesloft’s Drift platform, a third-party tool widely connected to customer relationship management (CRM) systems. Contact information from some customers and text from select support cases were exposed, though the company stressed that its products or infrastructure were not impacted. ## Breach Origin The incident stems from a campaign in which attackers stole OAuth and refresh tokens tied to Drift integrations. Those stolen tokens allowed unauthorized access into Salesforce environments, where large-scale queries were executed against CRM objects such as Accounts, Users, Opportunities, and Cases. Google Threat Intelligence attributes the operation to an actor it tracks as **UNC6395**, with activity observed between August 8 and August 18, 2025. ## Data Exposure According to Zscaler, the breach revealed customer names, business emails, job titles, phone numbers, geographic details, commercial data, licensing records, and text from a subset of support cases. File attachments were not included in the exposure. The company has clarified that the affected data was limited strictly to Salesforce and did not touch any of its cloud products. ## Company Response Following detection, Zscaler revoked Drift integrations, rotated API tokens, initiated a joint investigation with Salesforce, and introduced stricter authentication checks for customer support. The firm confirmed that no misuse of the accessed data has been observed so far. ## Expanded Threat Google has since reported that the Drift compromise extended beyond Salesforce, impacting **Drift Email** users as well. Stolen tokens were used to access some Google Workspace accounts that had integrated Drift services. Both Google and Salesforce disabled Drift integrations while security reviews progressed. Google has advised all organizations with Drift connections to rotate credentials immediately. ## Attack Attribution The wider campaign resembles Salesforce data-theft incidents carried out earlier this year by groups including **ShinyHunters**, which targeted enterprises such as Cisco and Workday. These intrusions often begin with vishing calls that trick employees into approving malicious OAuth apps, enabling large-scale data exfiltration without malware. Whether UNC6395 is directly linked to ShinyHunters remains unconfirmed, but the operational overlap is notable. ## Customer Guidance Zscaler is urging customers to be alert for phishing attempts, verify any unexpected requests for information, and rely exclusively on official support channels. Security teams are encouraged to review integration inventories, revoke Drift tokens, check Salesforce logs for suspicious queries, and rotate any credentials referenced in exposed support cases. The breach illustrates how quickly trust in SaaS ecosystems can be weaponized. While Zscaler has reassured customers that its services remain unaffected, the incident underlines the risks posed by third-party integrations. With attackers exploiting OAuth trust relationships instead of deploying malware, enterprises must adopt tighter monitoring of API connections and apply stricter lifecycle management for tokens.

loading..   01-Sep-2025
loading..   3 min read