-
Dreamforce ’25 REview: Identity, speed, and shared responsibility
Security wasn’t a side topic at Dreamforce ’25 — it joined the main stage. From Salesforce’s new Security Mesh to the rise of identity protection and AI-powered threats, here’s what I took away and why…
-
WithSecure unveils Identity Protection to close one of Salesforce’s biggest security blind spots
WithSecure has unveiled Identity Protection for Salesforce — the first solution to detect compromised partner and customer accounts before they can be used in attacks. Designed to close one of the platform’s biggest security blind…
-
What’s new in WithSecure Cloud Protection for Salesforce 3.0
The Apollo 3.0 release introduces Identity Protection – a new layer of protection that monitors internal and external user credential compromise.
-
Credential compromise monitoring in Salesforce is early breach prevention
When defenders get a chance to see credential exposures in Salesforce, the risks can be mitigated before they become incidents. This is stopping breaches at their very first step.
-
Credential stuffing in Salesforce: When attackers log in instead of breaking in
Learn how credential stuffing impacts Salesforce – from internal to community users – and how to prevent account takeover.
-
Phishing training is essential but it’s only one part of the equation
Phishing awareness training helps, but it can’t keep up with today’s AI-driven attacks moving beyond email. Learn why Salesforce is the new phishing target and how to protect users before they click.
-
Salesforce threat protection in action
Salesforce is mission-critical — and increasingly targeted. See how WithSecure Cloud Protection for Salesforce safeguards files, links, identities, and Agentforce actions inside Salesforce with real-time detection, granular control, and audit-readiness.
-
Attack kill chain: how hackers layer tactics inside Salesforce
From weaponized file uploads and QR-redirected phishing to credential theft and mass exfiltration, attackers stitch a kill chain out of everyday Salesforce actions. Layered, in-platform detection severs that chain in real time.
-
Salesforce attacks in 2025: Why cyber criminals are targeting Salesforce
Cyberattacks against Salesforce are accelerating to a record high in 2025. Threat actors exploit identity, trust, and everyday business workflows to breach high value targets like Google and luxury brands. In this blog, we examine…
-
Rethinking defense in depth inside Salesforce
SaaS has shifted where attacks happen: from networks to platforms. Defense in depth has to evolve with it. This article explores how AI-driven Salesforce can be secured from the inside out with layered protection.
-
Dreamforce PREview: Why security is set to steal the show
Security takes center stage at Dreamforce 2025. From high-profile breaches to Salesforce’s new CrowdStrike partnership, this year’s focus is on trust, resilience, and responsible innovation. I’ll be exploring how Agentforce and Data Cloud are evolving—and…
-
Identity security in Salesforce guide: how to reduce breach risk
Identity is the foundation of Salesforce security. Every user, login, and integration depends on trust – and it needs constant verifying.
-
Salesforce security buyer’s guide: the best threat protection for your enterprise in 2025
We understand that securing Salesforce is no easy task. Cyber threats evolve daily, Salesforce environments are expanding, and AI-driven automation like Agentforce is accelerating the pace of data flows. Security teams are under pressure to…
-
Agentforce security: AI agents in Salesforce are fast. Cyber threats are faster.
As AI agents handle vast amounts of data, security risks also increase – malicious files and URLs can introduce malware and phishing threats. To fully and securely unlock Agentforce’s potential, organizations must ensure AI agents operate…
-
WithSecure launches native malware and phishing protection for Salesforce Agentforce
AI agents open new attack vectors in Salesforce — WithSecure moves fast to keep AI agents secure to use.
-
What’s new in WithSecure Cloud Protection for Agentforce 1.0
The first Agentforce-native security layer. Real-time protection against phishing and malware for Agentforce workflows.
-
How to secure connected apps and OAuth connections in Salesforce
This guide walks Salesforce professionals and security teams through the exact connected app settings, policies, and monitoring steps needed to block attack paths that hackers exploit today.
-
Salesforce Experience Cloud Security: Architecting for Scale Without Compromise
Salesforce Experience Cloud security is now business-critical. As enterprises expand portals for partners and customers, new risks emerge—from guest access and file uploads to AI-driven workflows. Let’s go through proven best practices and Zero Trust…
-
Why cloud-first security matters: Protecting Salesforce and SaaS data from modern threats
Cyber threats have shifted to the cloud, where the most valuable data and biggest risks now live. From phishing and malicious APIs to hidden malware in customer portals, attackers target SaaS platforms like Salesforce. Traditional…
-
Shadow access in Salesforce: How overprivileged users become your next data breach
Not every Salesforce breach starts with a sophisticated exploit. More often, it’s something simpler — a forgotten role, a lingering permission, or an inactive account that never got deactivated. These hidden “shadow access” points turn…
-
How attackers exploit Salesforce OAuth device flow
A new wave of attacks shows how threat groups like ShinyHunters are abusing Salesforce’s OAuth 2.0 Device Flow to trick users into handing over access. What starts as a simple vishing call can quickly escalate…
-
What’s new in WithSecure™ Cloud Protection for Salesforce 2.9.1
QR codes in Salesforce look harmless. Until they aren’t. Today’s phishing attacks hide behind layers: a QR code inside a file, a shortened link inside the code. WithSecure Cloud Protection for Salesforce now detects them…
-
Salesforce data protection 101 – What is the Salesforce security model?
We know that cyber security is complex. Likewise, your Salesforce environment is no different. Let’s keep things simple in this article, and crystallize what every Salesforce professional should know about Salesforce data protection.
-
Secure-by-design: How to protect Agentforce in Salesforce
Agentforce has quickly become one of the most talked-about innovations in the Salesforce ecosystem. More than an automation upgrade, it’s an unavoidable shift in how work — and security — must be managed inside Salesforce.
-
If Endpoint Protection isn’t enough for email, it’s not enough for Salesforce
Would you trust endpoint protection alone to stop phishing or malware in your email? Of course not — email has multiple layers of defense like gateways, sandboxing, and phishing filters.
-
How field uploads exposed a hidden threat in Salesforce – Reverse engineering back to a pain point
A simple question—“Are our field uploads putting us at risk?”—led one manufacturing firm to rethink how they secure Salesforce. In this post, let’s see how mobile workflows uncovered a hidden threat, and how a native,…
-
Coinbase breach: What happened, and what it means for Salesforce security
Coinbase, one of the world’s largest cryptocurrency exchanges, disclosed a data breach that involved the theft of sensitive customer information and a $20 million extortion attempt by cybercriminals. Read more to find out how that…
-
Credential theft, malware, and the hidden risk to Salesforce environments
A large-scale malware campaign exposed how easily stolen credentials can compromise cloud platforms. Here’s why Salesforce environments are vulnerable—and what you can do to protect yours.
-
Salesforce security: What you REALLY need to know
Salesforce security isn’t just IT’s job. Learn how to build resilience, manage AI risks, and close gaps in your shared security model.
-
Securing the future of Agentforce: Why Salesforce data governance can’t be an afterthought
As Agentforce and other AI tools revolutionize customer engagement, I’m seeing a common pattern in the Salesforce ecosystem: companies racing to deploy exciting new tech without fully understanding the risks.
-
How to block encrypted ZIP threats in Salesforce
Attackers exploit password-protected ZIPs to bypass file scanners and slip malware past defenses. Learn how treating encrypted files as policy violations and blocking them directly on Salesforce can neutralize threats before they reach users or…
-
What you need to consider in your file security solution for Salesforce
File uploads in Salesforce are a convenient vector for cyber threats. So, what to look for in a Salesforce file security solution? Let’s mirror industry standards like AV-TEST, and conclude why multi-layered real-time protection is…
-
Jira credentials breached: Why the HELLCAT attacks should alarm every Salesforce customer
The HELLCAT breaches show how a single compromised credential from an old external Jira user can trigger a cascade of damage. Identity security isn’t new, but today’s threats easily bypass traditional defenses. This isn’t just…
-
Future of Agentforce: cyber threat landscape
As organizations integrate AI-driven innovations like Salesforce’s Agentforce, both the operational landscape and threat landscape are changing.
-
What’s new in WithSecure™ Cloud Protection for Salesforce 2.6
Detect malware inside password protected archives and block newly registered – and often malicious – domains
-
The risk of newly registered domains on Salesforce and how to mitigate it
Cyber criminals frequently employ newly registered domains (NRDs) to orchestrate phishing attacks, setting up these domains specifically to host phishing sites that deceive users into divulging sensitive information and account credentials. Beyond phishing, these NRDs…
-
Is your Salesforce DORA compliant?
If you work for a financial institution and European Union regulations apply to your team, you may have bumped into The Digital Operational Resilience Act (DORA). Let’s explore what DORA is and what it means…
-
5 Things You Should Know About Securing Salesforce
Securing your Salesforce instance should be a top priority. But having it be a priority and knowing what to do about it are two different topics. It is a complex topic, but the following “5…
-
Lessons learned from email for Salesforce security
As email is getting stronger and stronger cyber security measures, cyber criminals are seeking new vulnerable avenues to exploit. This shift highlights a crucial lesson for Salesforce security.
-
QR code quishing attacks on Salesforce and how to detect them
QR codes are no stranger in our daily transactions. Originally designed to streamline processes, they have also become a tool for cybercriminals, giving rise to a modern form of phishing called quishing.
-
Q3 2024 cyber threat landscape: Implications for Salesforce security
Understanding the cyber threat landscape is crucial for every cyber defender. Read on to explore the latest trends, such as the tactics, techniques, and procedures (TTPs) used by cybercriminals.
-
What’s new in WithSecure™ Cloud Protection for Salesforce 2.5
Detect and block malicious URLs in your Salesforce environment across custom objects and fields and prevent QR code quishing attacks
-
What’s really happening in your Salesforce environment?
Salesforce’s flexibility brings unique security challenges. Discover why traditional defenses fall short and how to protect your environment from hidden threats.
-
5 steps to a secure Salesforce
Your Salesforce data is under threat. If that data is left unprotected, your business and your customer data could be hit by a ransomware or phishing attack. By default, the infrastructure of Salesforce is secure…
-
The hidden risks of Salesforce—and how to address them
Do you really know what’s happening in your Salesforce environment? Working in enterprise cloud applications like Salesforce is secure—but only up to a point. While software-as-a-service (SaaS) vendors such as Salesforce regularly strengthen their services…
-
Salesforce data residency best practices
In this article, we’ll explore why data residency matters for Salesforce security and provide best practices for managing Salesforce data residency.
-
What does Snowflake breach mean for Salesforce security?
A recent cyberattack on Snowflake, a cloud-based data warehousing platform, highlights the importance of robust security measures in cloud services. The breach, which involved the exploitation of infostealer malware and stolen login credentials, resulted in…
-
The Rising Threat of AI-Powered Cybercrime: FraudGPT
As the world increasingly embraces Artificial Intelligence (AI), cybercriminals are also harnessing its power to create sophisticated cybercrime tools. The latest and most alarming development in this realm is the emergence of a new AI…
-
PDF malware and how to defend your Salesforce against it
Envision your Salesforce system as the heartbeat of your enterprise, where every transaction fuels your business growth. Now picture that one seemingly innocuous PDF could undermine it all. This isn’t fearmongering; a research has found…
-
Securing Salesforce Service Cloud
Salesforce Service Cloud is a vital tool for customer service, but its data-rich environment also attracts cybercriminals. Protecting against malware and phishing attacks in Salesforce is essential for maintaining a healthy, secure environment.
-
Using Salesforce securely
The National Cyber Security Centre (NCSC) exists to help make the UK the safest place to live and work online. This month, the NCSC has published new guidance on how to use a cloud service…
-
Countering the risks of file-type spoofing in cybersecurity
Cyber attackers constantly develop new methods to breach systems. A common but often overlooked tactic is altering file extensions to hide malicious files in plain sight: a method called file type spoofing. This article examines…
-
Short links: a hidden risk in your Salesforce environment
Shortened URLs are a staple in our digital lives, especially on social media. They are practical, space-saving tools in character-limited posts, allowing for more informative or engaging content. However, they come with a caveat: the…
-
Protect Salesforce from file-based URL threats
File-based threats are not just about malware; malicious URLs from seemingly innocent files can cause significant damage. It’s time to bolster your defenses and ensure your Salesforce security strategy is airtight against sophisticated URL-based attacks.
-
The “PhishForce” exploit: Cloud vulnerability case study
A look at how attackers used Salesforce’s email features for phishing — and what it tells us about securing cloud platforms.
-
Salesforce Security Essentials – 7 Things to Keep in Mind
Salesforce is the leading CRM system in the world and Salesforce Cloud applications such as Sales Cloud, Service Cloud, Experience Cloud, and Community Cloud are now a business-critical service for organizations across a wide range…
-
What are the real risks of using Salesforce?
For businesses, cyber security is a shared responsibility. Like many software-as-a-service (SaaS) providers, Salesforce builds excellent infrastructure security into its products and services.
-
Saleforce security best practices for financial services
Banks and financial institutions are increasingly turning to Salesforce to improve communications with customers and partners.
-
Defending Salesforce against relentless cyberattacks with AI
Salesforce is one of the most popular customer relationship management (CRM) platforms in the world, enabling businesses to manage their customer data, sales activities, and marketing campaigns from a single platform.
-
The role of AI in the modern cyber security landscape
The rise of cyber attacks in recent years has made cyber security an essential aspect of running any business.
-
Is Your Company’s CRM Platform Secure?
Organizations depend on customer relationship management (CRM) systems to build meaningful customer relationships, find new customers, and increase revenues.
-
Why Salesforce cyber security matters
Businesses rely on customer relationship management (CRM) platforms to manage and track their sales and customer data. Salesforce, the world’s leading CRM platform, saves companies millions in overhead costs and, in the process, stores gigabytes…
-
Defending Salesforce from phishing attacks
Millions of users access Salesforce daily to manage company data and information. Unfortunately, this popularity comes with the cost of making the platform an attractive target for malicious actors, including cyber criminals who use phishing…
-
Salesforce phishing scams: What to do when attacked
Phishing is an increasingly popular form of cyber-attack where criminals send messages or emails containing malicious links to trick people into downloading malware or rerouting to fake sites.
-
Mastering data & security literacy for Salesforce users
It’s more important than ever to ensure your organization is on the right track in terms of data and security literacy.
-
Cyber security skills – efficiency through automation
In the fast-paced world of technology, the importance of cyber security cannot be overstated. As we move into 2023, the skills required to perform effectively in this field have evolved. To begin with, an in-depth…
-
Shared responsibility model: know & reduce your risks
The shared responsibility model (SRM) in cloud security is a crucial concept that both cloud service providers and cloud users need to understand and adhere to in order to minimize the risks associated with cyber…
-
Cybersecurity goes beyond just endpoint protection
Cybersecurity isn’t just about protecting endpoints anymore. With cloud platforms playing a central role in business, organizations need to address growing risks beyond the device level.
-
Understanding the motives and methods of cybercriminals
The computer technology that surrounds us — the devices and software we use every day, as well as the systems upon which our businesses rely — has made cybersecurity an ever-present concern.
-
Understanding internal & external cyber security threats
In today’s rapidly evolving digital landscape, the frequency and sophistication of cyber attacks continue to rise which poses a significant risk to organizations of all sizes.
-
Salesforce security with Kill Chain & MITRE ATT&CK
In today’s digital world, security is a top priority for businesses and individuals alike.
-
Disrupt the kill chain & stop email-to-case attacks
In the world of cybersecurity, organizations must stay vigilant against a myriad of evolving threats. And with Salesforce being a vital platform for businesses worldwide, safeguarding its infrastructure is of paramount importance. One tool that…
-
Disrupt the kill chain & stop community portal attacks
In today’s digital age, businesses are heavily reliant on cloud-based technology, with Salesforce being one of the most popular CRM platforms in use. While Salesforce has a built-in security mechanism to protect customers from cyberattacks,…
-
Disabling vs. securing file upload on Salesforce
Salesforce provides various ways for users to add file attachments, consolidating documents related to leads, cases, and more. File uploads offer numerous beneficial use cases, yet they are not without associated risks.
-
How to make sure your next Salesforce project is secure
Salesforce is designed to be highly customizable to meet your business needs. There are more than 3,400 applications on the Salesforce AppExchange alone, and many third-party APIs and plugins are readily available online.
-
How DevOps Supply Chain Attacks Put Your Salesforce Security at Risk
DevOps pipelines drive speed and automation, but to attackers they’re a hidden back door into platforms like Salesforce. If your CI/CD stack isn’t secured, your SaaS isn’t either.
-
Third-party integrations: Hidden Salesforce risks
Supply chain attacks have emerged as one of the greatest security threats in recent years. Gartner has named digital supply chain risk as one of the leading security and risk management trends for 2022 and…
-
Protecting Salesforce from human error
When using Salesforce, companies need to bear in mind a variety of different risk factors.
-
Think your Salesforce data is secure? Think again.
Salesforce operates a shared security model. This means you are responsible for protecting your business data—and keeping harmful content such as files, phishing emails, and rogue links out of your CRM, and your wider business…
-
Disrupting the Kill Chain with WithSecure™ Cloud Protection for Salesforce
Salesforce Cloud applications like Sales Cloud, Service Cloud or Experience Cloud are now a business-critical service for organizations across a wide range of industries and verticals. Unfortunately, their popularity has attracted the attention of cyber…
-
Cyber Kill Chain
Learn how cyber attackers can leverage vulnerabilities in Salesforce and how you can stop them.
-
Why CASB might not be the right fit for securing your Salesforce
CASBs help enforce cloud policies, but they’re not built for Salesforce. Discover where they fall short — and how native protection closes the gap.
-
Anatomy of a Salesforce supply chain attack
Every modern enterprise today sits at the center of a vast and complex network of digital suppliers. Affordable high-speed internet and the vast and fast-growing global cloud market mean that organizations can easily outsource anything…
-
What’s new in WithSecure™ Cloud Protection for Salesforce 2.4
Detect and block malicious URLs in your Salesforce environment, from custom objects and fields to file attachments and even shortened web links.
-
What’s new in WithSecure™ Cloud Protection for Salesforce 2.3
Detect and block disguised file types, and report detections straight from the app
-
What’s new in WithSecure™ Cloud Protection for Salesforce 2.2
Master your data: deep threat analysis meets controlled geographic processing
-
What’s new in WithSecure™ Cloud Protection for Salesforce 2.1
Understand your security status and configurations with a glance
-
What’s new in WithSecure™ Cloud Protection for Salesforce 2.0
Configurable Click-Time URL Protection, bolstered file scanning, future-proof solution architecture and more
Get a Free Demo
THE #1 SALESFORCE MALWARE PROTECTION SOLUTION
Fill the form and get:
Free 15-day trial – test the product without limitations
Real attack simulation and product demo
Free customized and actionable risk assessment




















































































