Zendesk Account Takeover Vulnerability Exposes Customer Support Data

A critical vulnerability in Zendesk's customer support platform has been discovered, allowing attackers to potentially take over user accounts. This security flaw could enable unauthorized access to sensitive customer data, posing significant risks to businesses relying on Zendesk for support operations. The vulnerability stems from improper authentication mechanisms, which threat actors could exploit to bypass security controls and gain elevated privileges. Organizations using Zendesk are urged to apply patches and enhance monitoring to mitigate potential breaches. This incident highlights the importance of robust security practices in SaaS platforms and the need for continuous vulnerability assessments to protect customer information. Zendesk, a widely used customer service software, has been targeted by cybercriminals exploiting this account takeover vulnerability. The flaw allows attackers to impersonate legitimate users, potentially leading to data leaks and service disruptions. Security experts recommend immediate action, including updating software versions and reviewing access controls, to prevent exploitation. The discovery of this vulnerability underscores the evolving threat landscape where attackers increasingly focus on SaaS applications to gain footholds in enterprise environments. Companies must prioritize security updates and employee awareness to defend against such sophisticated attacks. The Zendesk vulnerability serves as a reminder of the critical need for comprehensive cybersecurity strategies encompassing both technology and human factors.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 25 Aug 2025 14:10:15 +0000


Cyber News related to Zendesk Account Takeover Vulnerability Exposes Customer Support Data

How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 year ago Aws.amazon.com
Advanced Threat Protection for Zendesk Launched by Perception Point - Perception Point, a leading provider of AI-powered cybersecurity solutions, has announced the launch of its advanced threat protection, specifically dedicated to Zendesk services. The solution was developed to protect customer service communications, ...
3 years ago Csoonline.com
Zendesk Account Takeover Vulnerability Exposes Customer Support Data - A critical vulnerability in Zendesk's customer support platform has been discovered, allowing attackers to potentially take over user accounts. This security flaw could enable unauthorized access to sensitive customer data, posing significant risks ...
6 months ago Cybersecuritynews.com CVE-2024-12345
Email Bombs Exploit Lax Authentication in Zendesk - Zendesk, a popular customer service platform, has been targeted by attackers exploiting weak authentication mechanisms to launch email bomb attacks. These attacks involve overwhelming Zendesk's ticketing system with a flood of emails, causing ...
4 months ago Krebsonsecurity.com
Adobe Real-Time CDP: Personalized Customer Experience - Adobe Experience Cloud Products like Adobe Real-Time CDP are available to assist. A revolutionary solution called Adobe Real-Time Customer Data Platform was created to assist companies in realizing the whole value of their customer data. Adobe ...
2 years ago Hackread.com
Okta: Breach Affected All Customer Support Users - When KrebsOnSecurity broke the news on Oct. 20, 2023 that identity and authentication giant Okta had suffered a breach in its customer support department, Okta said the intrusion allowed hackers to steal sensitive data from fewer than one percent of ...
2 years ago Krebsonsecurity.com
E-commerce Security: Protecting Customer Data - In today's digital landscape, ensuring the security of customer data in e-commerce is a crucial concern for businesses. Protecting e-commerce data security is a complex task that requires a comprehensive understanding of the challenges faced by ...
2 years ago Securityzap.com
Review: Top 5 For Outsourced Customer Service Solutions UK and Abroad - For companies that have too many phone calls and emails to keep up, it is very common to outsource your customer services, either domestically in the UK or abroad to the likes of India or The Philippines. An outsourced customer service firm can ...
1 year ago Itsecurityguru.org
CVE-2007-2850 - The Session Reliability Service (XTE) in Citrix MetaFrame Presentation Server 3.0, Presentation Server 4.0, and Access Essentials 1.0 and 1.5, allows remote attackers to bypass network security policies and connect to arbitrary TCP ports via a ...
8 years ago
Dangling DNS Attack Let Hackers Gain Control Over Organization’s Subdomain - These “Dangling DNS” attacks occur when DNS records, particularly canonical name (CNAME) records, point to resources that no longer exist or have been deprovisioned, creating an opportunity for attackers to register and control these ...
10 months ago Cybersecuritynews.com
The Rise of Digital Customer Experience - Digital customer experience is a hot topic these days. In all seriousness, digital customer experience is one of the most important differentiators for your business. At its core, DCX is about the customer journey-a guided path for your customers to ...
2 years ago Feedpress.me
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
8 months ago Cybersecuritynews.com
The Irrefutable Case for Customer-Native DSPM - The counterpoint to these awful statistics is the emergence of data security posture management, which involves the continuous assessment, monitoring, and enhancement of an organization's data security. While some DSPM providers advocate traditional ...
1 year ago Securityboulevard.com
Customer Success Stories - Below is a short summary of all the new 2023 financial services customer success stories. Also at Cisco conferences and events we often have customers present but unfortunately most of the time these presentations are not turned into formal customer ...
2 years ago Feedpress.me
Juniper Support Portal Exposed Customer Device Info - Until earlier this week, the support website for networking equipment vendor Juniper Networks was exposing potentially sensitive information tied to customer products, including which devices customers bought, as well as each product's warranty ...
2 years ago Krebsonsecurity.com
Coinbase data breach exposes customer info and government IDs - While the threat actors managed to steal a combination of personally identifiable information of up to 1% of Coinbase's customer base (around 1 million individuals), they couldn't steal customers' private keys or passwords, and couldn't ...
9 months ago Bleepingcomputer.com
Google Fi Data Breach Reportedly Led to SIM Swapping - The Google Fi telecommunications service has informed customers about a data breach that appears to be related to the recently disclosed T-Mobile cyberattack. Google Fi, which provides wireless phone and internet services, has told customers that the ...
3 years ago Securityweek.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
2 years ago Esecurityplanet.com
CSO's Guide: Water-Tight Account Security For Your Company - In today's escalating threat landscape, account takeover and credential compromise remain top attack vectors for data breaches. CSOs must mandate and implement robust account security to protect critical assets. This comprehensive guide examines ...
2 years ago Securityboulevard.com
Congratulations to our 2023 CX Customer Hero Award Winners - There is no event quite like Cisco Live for our Customer Experience team. Successful transformation happens when innovative leaders dream big and collaborate with Cisco CX to execute on those dreams. Today, we are presenting a Cisco CX Customer Hero ...
2 years ago Feedpress.me
Okta Admits All Customer Support Users Impacted By Breach - Okta has revealed that an October security breach compromised all users of its customer support system rather than a small subset as previously thought. CSO David Bradbury said last month that only 134 customers were impacted after a threat actor ...
2 years ago Infosecurity-magazine.com
Internationalizing Efforts to Counter Tech Support Scams - The Central Bureau of Investigation, India's federal enforcement agency, recently conducted a series of criminal raids against illegal call centers across the country in an attempt to clamp down on tech support fraud. These raids were the result of a ...
2 years ago Darkreading.com
Google Fi User Data Breached Through T-Mobile Hack - According to Google Fi's email sent to its customers on Monday, a limited amount of their customer data was exposed in T-Mobile's breach after suspicious activity was noted in a system that contained Google Fi's customer data. Google Fi, Google's ...
3 years ago Hackread.com
Future of eCommerce: Emerging Technologies Shaping Online Retail in 2024 - Top-notch stores are moving online as eCommerce continues to lead with breakthrough innovations that are transforming global business operations and consumer shopping behaviours. This blog post explores how technologies such as Artificial ...
1 year ago Hackread.com
Zendesk Employees Fall Prey to SMS Phishing Scam - Recent reports reveal that employees of Zendesk, a San Francisco-based customer service platform, have been targeted by a sophisticated SMS phishing scam. ...
3 years ago Hackread.com