![]() ![]() ![]() Either the sales organization users or other users involved in the customer relationship process will open malicious files they believe to be associated with a sales engagement at a later date or as per the CRM workflow. The malicious files residing inside the cloud CRM services are typically viewed as internal files. Cloud CRM services as an attack vector in the cloud The malicious files identified by the Netskope Threat Research Labs in cloud CRM services are detected by Netskope Threat Protection as, Backdoor.Generckd.3017777 and. These files can be shared/collaborated on within an organization’s cloud CRM service thereby creating a new malware attack and propagation vector. Netskope Threat Research Labs have identified malicious files related to credential stealers and backdoors residing in popular cloud CRM services. Cloud Customer Relationship Management (CRM) services are broadly used, house organization’s most critical customer data, and deliver those data to corporate users via the web. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |