Back to List
Industry NewsCybersecurityAIData Security

Attackers Exploit CX Platform AI Blind Spots to Compromise 700+ Organizations, Bypassing Approved SOC Defenses

A critical security vulnerability in Customer Experience (CX) platforms, often overlooked by Security Operations Centers (SOCs), has allowed attackers to compromise over 700 organizations. Attackers are poisoning the data fed into CX platform AI engines, which then trigger automated workflows connected to sensitive systems like payroll, CRM, and payment systems. The Salesloft/Drift breach in August 2025 exemplified this, where attackers accessed Salesforce environments across numerous organizations, including Cloudflare and Palo Alto Networks, by stealing OAuth tokens and scanning for AWS keys and plaintext passwords, all without deploying malware. Security leaders often miscategorize these platforms, failing to recognize their deep integration with critical business systems. This gap is exacerbated by the fact that while 98% of organizations have DLP programs, only 6% dedicate resources, and 81% of intrusions now use legitimate access, not malware. Cloud intrusions surged 136% in the first half of 2025, highlighting the urgent need to address input integrity once AI is integrated into workflows.

VentureBeat

Customer Experience (CX) platforms, which process billions of unstructured interactions annually through survey forms, review sites, social feeds, and call center transcripts, are feeding these vast datasets into AI engines. These AI engines subsequently trigger automated workflows that interact with critical business systems such as payroll, CRM, and payment systems. A significant security blind spot has emerged: Security Operation Center (SOC) leaders' existing tools do not inspect the data ingested by these CX platform AI engines. Attackers have identified and exploited this vulnerability by 'poisoning' the data, effectively making the AI perform the malicious actions on their behalf.

The Salesloft/Drift breach in August 2025 serves as a clear illustration of this attack vector. During this incident, attackers compromised Salesloft’s GitHub environment, subsequently stealing Drift chatbot OAuth tokens. This unauthorized access allowed them to infiltrate Salesforce environments across more than 700 organizations, including prominent names like Cloudflare, Palo Alto Networks, and Zscaler. Following the breach, the stolen data was scanned for sensitive credentials such as AWS keys, Snowflake tokens, and plaintext passwords. Notably, no malware was deployed in the attack, indicating a reliance on exploiting legitimate access and system functionalities.

This security gap is more pervasive than many security leaders currently acknowledge. According to Proofpoint’s 2025 Voice of the CISO report, which surveyed 1,600 CISOs across 16 countries, 98% of organizations have a data loss prevention (DLP) program in place, yet only a mere 6% allocate dedicated resources to it. Furthermore, CrowdStrike’s 2025 Threat Hunting Report highlights that 81% of interactive intrusions now leverage legitimate access credentials rather than deploying malware. The report also noted a significant surge in cloud intrusions, which increased by 136% in the first half of 2025.

Assaf Keren, Chief Security Officer at Qualtrics and former CISO at PayPal, emphasized the severity of this miscategorization in an interview with VentureBeat. He stated, “Most security teams still classify experience management platforms as ‘survey tools,’ which sit in the same risk tier as a project management app.” Keren stressed that this is a “massive miscategorization” because these platforms are now deeply integrated with HRIS, CRM, and compensation engines. Qualtrics alone processes 3.5 billion interactions annually, a figure that has doubled since 2023. The increasing integration of AI into workflows necessitates that organizations cannot afford to overlook steps related to input integrity.

Related News

Industry News

Hacker News Discussion: 'Be Wary of Bluesky' - An Overview of User Comments and Concerns

This news item, sourced from Hacker News and published on February 20, 2026, under the title 'Be Wary of Bluesky,' consists solely of user comments. As the original content provided is 'Comments,' the summary reflects that the article is a compilation or discussion thread where users express their views, concerns, or experiences regarding Bluesky. Without the actual content of these comments, a detailed summary of specific points cannot be generated, but it indicates an active community discussion around the topic.

Industry News

US Citizens Reportedly Dismantling and Destroying Flock Surveillance Cameras Nationwide

Reports indicate a growing trend across the United States where individuals are actively dismantling and destroying Flock surveillance cameras. This activity suggests public resistance or concern regarding the deployment and use of these surveillance technologies. The original news content, published on February 20, 2026, from Hacker News, primarily consists of 'Comments,' implying that the core information is derived from public discourse or observations rather than a detailed journalistic report. The precise motivations behind these actions and the scale of the incidents are not detailed in the provided source material, which only mentions the activity and its widespread nature.

Industry News

A16Z Partner Challenges 'Vibe Code Everything' Theory: A Critical Look at Future Development Paradigms

An A16Z partner has publicly stated that the theory suggesting a future where 'we'll vibe code everything' is 'wrong.' This brief statement, originating from Hacker News, indicates a divergence of opinion within the tech investment community regarding the future direction and methodology of software development. The comment, currently without further elaboration in the provided source, suggests a potential debate or skepticism concerning highly intuitive or abstract coding approaches, possibly in contrast to more structured or traditional methods. The lack of additional context leaves the specific reasons for this disagreement open to interpretation, but highlights a significant viewpoint from a prominent venture capital firm.