Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      10 Ways Node.js Development Boosts AI & Real-Time Data (2025-2026 Edition)

      August 18, 2025

      Looking to Outsource React.js Development? Here’s What Top Agencies Are Doing Right

      August 18, 2025

      Beyond The Hype: What AI Can Really Do For Product Design

      August 18, 2025

      BrowserStack launches Chrome extension that bundles 10+ manual web testing tools

      August 18, 2025

      How much RAM does your Linux PC really need in 2025?

      August 19, 2025

      Have solar at home? Supercharge that investment with this other crucial component

      August 19, 2025

      I replaced my MacBook charger with this compact wall unit – and wish I’d done it sooner

      August 19, 2025

      5 reasons to switch to an immutable Linux distro today – and which to try first

      August 19, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Sentry Adds Logs Support for Laravel Apps

      August 19, 2025
      Recent

      Sentry Adds Logs Support for Laravel Apps

      August 19, 2025

      Efficient Context Management with Laravel’s Remember Functions

      August 19, 2025

      Laravel Devtoolbox: Your Swiss Army Knife Artisan CLI

      August 19, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      From plateau predictions to buggy rollouts — Bill Gates’ GPT-5 skepticism looks strangely accurate

      August 18, 2025
      Recent

      From plateau predictions to buggy rollouts — Bill Gates’ GPT-5 skepticism looks strangely accurate

      August 18, 2025

      We gave OpenAI’s open-source AI a kid’s test — here’s what happened

      August 18, 2025

      With GTA 6, next-gen exclusives, and a console comeback on the horizon, Xbox risks sitting on the sidelines — here’s why

      August 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Workday Staff Fall to Social Engineering; Hackers Access Third-Party CRM Platform

    Workday Staff Fall to Social Engineering; Hackers Access Third-Party CRM Platform

    August 18, 2025

    Workday, Workday Social Engineering Attack, Social Engineering, IT Help Desk, Help Desk Attack

    Workday, a California-based human resource and financial management service provider, disclosed last week that it was recently targeted in a social engineering campaign aimed at several large organizations.

    The attackers posed as representatives from human resources or IT through phone calls and text messages to deceive employees, the company said.The end goal of this social engineering campaign was stealing account access or personal information that could possibly help in deeper penetration.

    Workday confirmed that the threat actors gained access to limited data from its third-party customer relationship management (CRM) platform.

    “We recently identified that Workday had been targeted and threat actors were able to access some information from our third-party CRM platform.” – Workday

    The company added that there is no evidence of unauthorized access to customer tenants or the data stored within them.

    The compromised information primarily included widely available business contact details such as names, email addresses, and phone numbers, which the attackers may use to advance future social engineering campaigns.

    The company said it acted swiftly to cut off the unauthorized access and has since strengthened safeguards to prevent similar incidents but did not reveal how long did the attackers have access, how many businesses’ details were compromised and what exact measures were taken to avoid such future incidents.

    Social Engineering Involving IT Help Desks Becoming Common

    Although so many advanced malware variants have emerged in the last one year, researchers note that social engineering still retains its top spot for initial access vector. According to Unit 42 of Palo Alto Networks, 36% of all incidents between May 2024 and 2025 began with a social engineering tactic. “These attacks consistently bypassed technical controls by targeting human workflows, exploiting trust and manipulating identity systems,” Unit 42 said. But what was striking is the fact that more than one-third of these social engineering incidents involved non-phishing techniques. Which means it involved campaigns like search engine optimization (SEO) poisoning, fake system prompts and help desk manipulation.

    The UK recently saw a string of social engineering attacks targeting help desks of some of its prominent retailers like Marks & Spencer, Co-op, and Harrods. A group called “DragonForce” was able to successfully deploy a social engineering approach against their IT help desks. The UK’s National Cyber Security Centre (NCSC) warned that the group may try to emulate the success and try target the country’s other large businesses.

    Also read: UK NCA Arrests Four in Cyberattacks on M&S, Co-op, and Harrods

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleGet Ready for the Black Hat USA 2025 CISO Podcast Series from The Cyber Express and Suraksha Catalyst
    Next Article Access Root Directory in Nautilus File Manager

    Related Posts

    Development

    Sentry Adds Logs Support for Laravel Apps

    August 19, 2025
    Development

    Efficient Context Management with Laravel’s Remember Functions

    August 19, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2013-10046 – Agnitum Outpost Internet Security Named Pipe Privilege Escalation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Algorithm Analysis Deep Dive

    Development

    “A future has been stolen from many of us” — ZeniMax Online Studios devs will reportedly soon be hit by Microsoft’s Xbox layoffs after the MMO Phil Spencer loved was cancelled

    News & Updates

    ChatGPT free users finally have access to this really helpful feature

    News & Updates

    Highlights

    News & Updates

    Lawsuit Claims Microsoft Is Ending Windows 10 Support to Sell AI PCs — “Millions of Users Will Not Buy New Devices or Pay for Extended Support”

    August 12, 2025

    A lawsuit says Microsoft is ending Windows 10 support to push AI PCs, warning millions…

    CVE-2025-53933 – WeGIA Stored Cross-Site Scripting (XSS)

    July 16, 2025

    You don’t need to manipulate to influence users’ decisions

    July 30, 2025

    Microsoft Defender for Identity Flaw (CVE-2025-26685) Allows Unauthenticated Privilege Escalation

    June 15, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.