Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Gainsight Investigates Security Breach Impacting Salesforce Customers
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Gainsight Investigates Security Breach Impacting Salesforce Customers

Highlights

  • Gainsight and Salesforce are investigating a recent connected systems breach.

  • Other platforms like Hubspot and Zendesk took cautious steps on access tokens.

  • Customers are urged to review logs and apply rigorous access controls.

Ethan Moreno
Last updated: 26 November, 2025 - 12:13 pm 12:13 pm
Ethan Moreno 1 hour ago
Share
SHARE

Contents
How Is Gainsight Addressing the Security Intrusion?What Applications Might Be Involved in the Breach?How Are Customers Being Guided on Risk Assessment?

After a recent security incident involving Gainsight’s customer management software and its integration with Salesforce, companies are working to clarify the scope of the breach. While Gainsight plays a key role in daily business operations for many, uncertainty remains about the extent of the impact on connected clients and third-party applications. Customers are looking for clear answers regarding their data safety, and both Gainsight and Salesforce are taking steps to address concerns while keeping open communication with their user base. Insights into incident response efforts and prevention recommendations have prompted user organizations to review and bolster their own security protocols.

News from earlier similar incidents, such as the Salesloft Drift breach, shows that downstream supply chain attacks can affect hundreds of customers through integration points. However, Gainsight reports fewer affected customers than those numbers. Like previous cases, confusion stems from differing reports by involved vendors, and varying methods of tracking affected clients, making it hard for outsiders to get a full picture immediately. In both situations, access tokens and third-party connectors were focal points of exploit and subsequent investigations.

How Is Gainsight Addressing the Security Intrusion?

Gainsight has engaged the expertise of Mandiant and is relying on incident reports from Salesforce to trace the breach. Salesforce initially reported three directly affected customers but has since found additional victims, although neither company has shared an exact number. Gainsight CEO Chuck Ganapathi emphasized ongoing communication and support with affected clients, stating:

“Salesforce has notified the affected customers and we have reached out to each of them to provide support and are working directly with them.”

Efforts by Mandiant and ongoing forensic analyses should provide further clarification as log examination and token behavior analysis progress.

What Applications Might Be Involved in the Breach?

Investigators are examining potential spread beyond Salesforce, looking at other connectors such as Hubspot, Zendesk, and Gong.io, which preemptively revoked Gainsight-related access tokens. No confirmed compromises on these platforms have been reported so far, and Salesforce maintains that its own platform did not exhibit the specific vulnerability. Google’s Threat Intelligence Group, connected to Mandiant, noted that over 200 Salesforce environments could be potentially affected, but has not released updated numbers. Despite discrepancies, only a small number of directly impacted customers have been identified so far, according to Gainsight’s communication.

How Are Customers Being Guided on Risk Assessment?

Both Gainsight and Salesforce are advising customers to review their security activity logs, with Salesforce logs cited as the most reliable for detecting unauthorized activity. Brent Krempges, chief customer officer at Gainsight, highlighted log utility issues, saying,

“Based on the nature of the logs we retain, many of our clients have not found them to be material in assessing any risk to their organization.”

Customers are encouraged to implement manual security controls, such as IP restrictions on API calls. The issue has sparked broader discussion on the importance of vendor coordination and layered security in integrated environments, echoing experiences from companies like Okta during previous breaches.

Gainsight CEO Ganapathi underlined the company’s accountability and the need for collective defense strategies. He committed to sharing lessons learned:

“The only way we beat these threats is by working together and sharing information and strategies.”

Gainsight has provided guidance to help customers maintain operations while affected connections remain offline, reinforcing a collaborative approach to information security across the SaaS community.

Supply chain breaches involving integrated SaaS products continue to challenge organizations, especially as both attackers and defenders adapt their tactics. Organizations dependent on tools like Gainsight, Salesforce, Hubspot, and Zendesk should prioritize regular log reviews, robust access management, and close communication with their vendors following incidents like this. Forensic investigations typically take time, and discrepancies in impact assessments are expected as more details come to light. Proactive security measures, including timely revocation of vacant or unused tokens and enforcing network restrictions, offer practical steps for reducing risk of similar incidents in the future. Staying updated with official communications and coordinating closely within the SaaS ecosystem can help institutions limit exposure when breaches occur.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Shai-Hulud Worm Hits npm Packages, Threatens 26,000 GitHub Repositories

Experts Challenge Persistent Security Myths With New Hacklore.org Launch

Salesloft Drift Breach Shows Risks in SaaS Integration Security

Agencies Face New Scrutiny Over Outdated Web Forms Risk

Salesforce Faces New Data Breach Linked to Gainsight Integration

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Tesla Opens World’s Largest Supercharger with 168 Stalls in California
Next Article Sovato Health Pushes Remote Surgery Forward With Strategic Partnerships

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Sovato Health Pushes Remote Surgery Forward With Strategic Partnerships
Robotics
Tesla Opens World’s Largest Supercharger with 168 Stalls in California
Electric Vehicle
Seagate Cuts 26TB Desktop Expansion Hard Drive Price Below Black Friday Levels
Computing
Legacy Automakers Reject Musk’s Offer to License Tesla FSD
Electric Vehicle
Tesla Fixes Navigation Display After User Complaints
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?