Blog
Security
/ 21 Sep, 2025Access tokens strike again, the Salesloft Drift breach
In mid‑August 2025, GTIG confirmed a large‑scale credential‑harvesting and data‑theft campaign abusing trusted OAuth integrations (Drift) to access Salesforce orgs.
Attackers (UNC6395) used stolen Drift OAuth tokens to mass‑query Salesforce, mine embedded secrets (AWS, Snowflake), and pivot into connected platforms.
This post reconstructs the attack flow, maps it to MITRE ATT&CK, and outlines immediate detection and defense actions.

Security
/ 21 Sep, 2025Access tokens strike again, the Salesloft Drift breach
In mid‑August 2025, GTIG confirmed a large‑scale credential‑harvesting and data‑theft campaign abusing trusted OAuth integrations (Drift) to access Salesforce orgs.
Attackers (UNC6395) used stolen Drift OAuth tokens to mass‑query Salesforce, mine embedded secrets (AWS, Snowflake), and pivot into connected platforms.
This post reconstructs the attack flow, maps it to MITRE ATT&CK, and outlines immediate detection and defense actions.

Security
/ 15 Jul, 2024Protecting against Snowflake breaches
In the last few weeks several very high-profile breaches have been in the news, from Santander to Ticketmaster and AT&T.
These breaches all have the same attack vector: identity-based attacks against Snowflake instances.
In this article, we discuss the causes of the breach and our approach to protect against identity-based attacks against Snowflake.

New Feature
/ 24 Jun, 2024Introducing the SlashID Local Deployment
The SlashID local deployment is our answer for developers looking to build, run and test apps locally.
Local development with SlashID can be a good fit for your evaluation, prototyping, development, and continuous integration workflows.


Security
/ 17 Jun, 2024ODPR: A Framework for Securing Non-Human Identities
Identity-based attacks have become the primary way attackers move laterally in a network. They are also responsible for half of the initial intrusions.
Addressing these attacks requires very different tooling and approaches compared to malware-based attacks.
In this article we delve into the SlashID framework to address these attacks.

New Feature
/ 10 Jun, 2024Credential Tokenization: Protecting third-party API credentials
Stolen secrets and credentials are one of the most common ways for attackers to move laterally and maintain persistence in cloud environments.
In this blog post we introduce credential tokenization to protect secrets at runtime, introduce separation of duties, and reduce the credential rotation burden.

New Feature
/ 3 Jun, 2024Secure API and M2M Access with OAuth2 Client Credentials and SlashID's sidecar
The recent Hugging Face breach is yet another reminder that securing machine-to-machine communication and API access is essential today.
By leveraging OAuth2 Client Credentials, you can enhance security, enable fine-grained access control, simplify credential management, and benefit from a standards-based approach.

New Feature
/ 14 May, 2024Introducing Organization Attributes
With organization attributes, you can now easily store and manage tenant-level data directly on our platform.

New Feature
/ 24 Apr, 2024Introducing Anonymous Users: Balancing First-Party Data Collection and User Experience
With the deprecation of third-party cookies, first-party data has become crucial for websites to personalize user experiences.
SlashID introduces Anonymous Users, a feature that allows websites to collect user data without forcing users to register or log in, striking the perfect balance between data collection and user experience.

Product Releases
/ 2 Apr, 2024SlashID SDK for PHP and Laravel authentication
While very popular, PHP lacks modern identity and access management (IAM) capabilities. SlashID changes that with the release of our SDK for PHP and Laravel.
This is just the beginning; according to W3Tech PHP is used by over 76% of indexed websites. In the weeks to come, we aim to cover other popular frameworks such as Drupal and Symfony.

Deep Dives
/ 6 Mar, 2024Adding custom claims to identity tokens
Adding custom claims to JWTs allows you to share identity information without repeated queries to external data sources.
Read on to learn how to customize claims with SlashID's webhooks.
