Cyberside Chats: Cybersecurity Insights from the Experts

Cyberside Chats: Cybersecurity Insights from the Experts
Podcast Description
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
Podcast Insights
Content Themes
The podcast covers a variety of crucial cybersecurity topics including emerging threats from AI tools like DeepSeek, the legal implications of cybercrime like the Silk Road, and recent law enforcement actions against malware like PlugX. Each episode provides actionable solutions and strategies, such as updating incident response plans and strengthening employee training against phishing attacks.

Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
Join us on September 17th for an interactive Cyberside Chats: Live! on Vibe Hacking: The Dark Side of AI Coding!
A single weak app integration opened the door for attackers to raid data from some of the world’s largest companies. Salesforce environments were hit hardest—with victims like Cloudflare, Palo Alto Networks, and Zscaler—but the blast radius also reached other SaaS platforms, including Google Workspace. In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down the Salesforce–Drift breach: how OAuth tokens became skeleton keys, why media headlines about billions of Gmail users were wrong, and what organizations need to do to protect themselves from similar supply chain attacks.
Key Takeaways
- Ensure Vendors Conduct Rigorous Technical Security Testing – Require penetration tests and attestations from third- and fourth-party SaaS providers.
- Limit App Permissions to “Least Privilege” – Scope connected apps only to the fields and objects they truly need.
- Implement Regular Key Rotation – Automate key rotation with vendor tools (e.g., AWS recommends every 60–90 days) to reduce the risk of leaked or stolen keys.
- Monitor for Data Exfiltration – Watch for unusual queries, spikes in API usage, or large Bulk API jobs.
- Limit Data Exfiltration Destinations – Restrict where exports and API jobs can go (approved IPs or managed locations).
- Integrate SaaS Risks into Your Incident Response Plan – Include guidance on rapidly revoking or rotating OAuth tokens and keys after a compromise.
References
- Google Threat Intelligence Group advisory on UNC6395 / Drift OAuth compromise
- Cloudflare disclosure on the Drift incident
- Zscaler security advisory on Drift-related Salesforce breach
- LMG Security Blog – Third-Party Risk Management Lessons
#Salesforcehack #SalesforceDrift #cybersecurity #cyberattack #cyberaware

Disclaimer
This podcast’s information is provided for general reference and was obtained from publicly accessible sources. The Podcast Collaborative neither produces nor verifies the content, accuracy, or suitability of this podcast. Views and opinions belong solely to the podcast creators and guests.
For a complete disclaimer, please see our Full Disclaimer on the archive page. The Podcast Collaborative bears no responsibility for the podcast’s themes, language, or overall content. Listener discretion is advised. Read our Terms of Use and Privacy Policy for more details.