EnContextoSocial.com
Bandera de DO
Inteligencia Editorial

EnContexto Social utiliza inteligencia artificial avanzada para recopilar, analizar y presentar noticias verificadas de la República Dominicana en tiempo real.

SECCIONES

Nacionales

Deportes

Economía

Mundo

Turismo

LEGAL

Términos de Uso

Privacidad

Cookies

Contacto

Sobre Nosotros

Administración

BOLETÍN DIARIO

Recibe las noticias más importantes a primera hora de la mañana. Sin spam, solo información.

​
© 2026 Noticias RD AI. Todos los derechos reservados
SISTEMAS OPERATIVOS
Nacionales

How attackers hit 700 organizations through CX platforms your SOC already approved

VentureBeat
VentureBeat
...

...

...

DOP
Análisis Cortex AI Disponible
Activa Cortex AI para generar resumen ejecutivo, métricas de sesgo, contexto y mejorar la redacción.
How attackers hit 700 organizations through CX platforms your SOC already approved
Fuente Original
CX platforms process billions of unstructured interactions a year: Survey forms, review sites, social feeds, call center transcripts, all flowing into AI engines that trigger automated workflows touch...
Imagen principal

CX platforms process billions of unstructured interactions a year: Survey forms, review sites, social feeds, call center transcripts, all flowing into AI engines that trigger automated workflows touching payroll, CRM, and payment systems. No tool in a security operation center leader’s stack inspects what a CX platform’s AI engine is ingesting, and attackers figured this out. They poison the data feeding it, and the AI does the damage for them.

The Salesloft/Drift breach in August 2025 proved exactly this. Attackers compromised Salesloft’s GitHub environment, stole Drift chatbot OAuth tokens, and accessed Salesforce environments across 700+ organizations, including Cloudflare, Palo Alto Networks, and Zscaler. It then scanned stolen data for AWS keys, Snowflake tokens, and plaintext passwords. And no malware was deployed.

That gap is wider than most security leaders realize: 98% of organizations have a data loss prevention (DLP) program, but only 6% have dedicated resources, according to Proofpoint’s 2025 Voice of the CISO report, which surveyed 1,600 CISOs across 16 countries. And 81% of interactive intrusions now use legitimate access rather than malware, per CrowdStrike’s 2025 Threat Hunting Report. Cloud intrusions surged 136% in the first half of 2025.

“Most security teams still classify experience management platforms as ‘survey tools,’ which sit in the same risk tier as a project management app,” Assaf Keren, chief security officer at Qualtrics and former CISO at PayPal, told VentureBeat in a recent interview. “This is a massive miscategorization. These platforms now connect to HRIS, CRM, and compensation engines.” Qualtrics alone processes 3.5 billion interactions annually, a figure the company says has doubled since 2023. Organizations can't afford to skip steps on input integrity once AI enters the workflow.

VentureBeat spent several weeks interviewing security leaders working to close this gap. Six control failures surfaced in every conversation.

Six blind spots between the security stack and the AI engine

1. DLP cannot see unstructured sentiment data leaving through standard API calls

Most DLP policies classify structured personally identifiable information (PII): names, emails, and payment data. Open-text CX responses contain salary complaints, health disclosures, and executive criticism. None matches standard PII patterns. When a third-party AI tool pulls that data, the export looks like a routine API call. The DLP never fires.

2. Zombie API tokens from finished campaigns are still live

An example: Marketing ran a CX campaign six months ago, and the campaign ended. But the OAuth tokens connecting the CX platform to HRIS, CRM and payment systems were never revoked. That means each one is a lateral movement path sitting open.

JPMorgan Chase CISO Patrick Opet flagged this risk in his April 2025 open letter, warning that SaaS integration models create “single-factor explicit trust between systems” through tokens “inadequately secured … vulnerable to theft and reuse.”

3. Public input channels have no bot mitigation before data reaches the AI engine

A web app firewall inspects HTTP payloads for a web application, but none of that coverage extends to a Trustpilot review, a Google Maps rating, or an open-text survey response that a CX platform ingests as legitimate input. Fraudulent sentiment flooding those channels is invisible to perimeter controls. VentureBeat asked security leaders and vendors whether anyone covers input channel integrity for public-facing data sources feeding CX AI engines; it turns out that the category does not exist yet.

4. Lateral movement from a compromised CX platform runs through approved API calls

“Adversaries aren’t breaking in, they’re logging in,” Daniel Bernard, chief business officer at CrowdStrike, told VentureBeat in an exclusive interview. “It’s a valid login. So from a third-party ISV perspective, you have a sign-in page, you have two-factor authentication. What else do you want from us?”

The threat extends to human and non-human identities alike. Bernard described what follows: “All of a sudden, terabytes of data are being exported out. It’s non-standard usage. It’s going places where this user doesn’t go before.” A security information and event management (SIEM) system sees the authentication succeed. It does not see that behavioral shift. Without what Bernard called "software posture management" covering CX platforms, the lateral movement runs through connections that the security team already approved.

5. Non-technical users hold admin privileges nobody reviews

6. Open-text feedback hits the database before PII gets masked

Employee surveys capture complaints about managers by name, salary grievances and health disclosures. Customer feedback is just as exposed: account details, purchase history, service disputes. None of this hits a structured PII classifier because it arrives as free text. If a breach exposes it, attackers get unmasked personal information alongside the lateral movement path.

Nobody owns this gap

The blast radius security teams are not measuring

Most organizations have mapped the technical blast radius. “But not the business blast radius,” Keren said. When an AI engine triggers a compensation adjustment based on poisoned data, the damage is not a security incident. It is a wrong business decision executed at machine speed. That gap sits between the CISO, the CIO and the business unit owner. Today no one owns it.

“When we use data to make business decisions, that data must be right,” Keren said.

Run the audit, and start with the zombie tokens. That is where Drift-scale breaches begin. Start with a 30-day validation window. The AI will not wait.

Fuente Original
VentureBeat
Leer completa

Comentarios (0)
ANTERIOR

Amazon’s Dell Deal Days sale is blowing out monitors, laptops, desktop PCs, and more for clearance prices

SIGUIENTE

In a 'race against time,' archaeologists uncovered Roman-era footprints from a Scottish beach before the tide washed them away

Más en Nacionales
Opinión: Llegó la hora de Flick, la hora del entrenador
Nacionales
🇩🇴
20 feb•2 MIN

Opinión: Llegó la hora de Flick, la hora del entrenador

Con las alarmas prendidas por la posible eliminación de la Copa del Rey y la pérdida del liderato en LaLiga, el entrenador alemán está obligado a mejorar el sistema defensivo....

ESPNESPN
Roberto Ángel presenta campaña “Los dominicanos nos reconocemos” en Jimaní y Barahona
Nacionales
🇩🇴
20 feb•5 MIN

Roberto Ángel presenta campaña “Los dominicanos nos reconocemos” en Jimaní y Barahona

El ministro de Cultura, Roberto Ángel Salcedo, presentó este jueves en las provincias Independencia y Barahona la campaña “Los dominicanos nos reconocemos”, una iniciativa orientada a reafirmar la dom...

Z101 DigitalZ101 Digital
Hoy es Día Internacional de la Lengua Materna
Nacionales
🇩🇴
21 feb•9 MIN

Hoy es Día Internacional de la Lengua Materna

El 21 de febrero se celebra el Día Internacional de la Lengua Materna con el objetivo de preservar y proteger todos los idiomas y dialectos que se hablan en todo el mundo. Tema 2023: Educación multili...

De Último MinutoDe Último Minuto
SANTO DOMINGO
Divisas (DOP)

USD


EUR

Actualizado en tiempo real
El Resumen IA

Recibe cada mañana las 5 noticias que debes saber, analizadas por nuestra inteligencia artificial.

Suscribirme gratis

Lo más leído
Identificando tendencias...
Videos Destacados
ANTERIOR
SIGUIENTE