<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>cybercrime.club</title><link>https://cybercrime.club/tags/salesloft/</link><description>Infrastructure security news for people who build infrastructure.</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Sun, 03 May 2026 10:00:00 -0400</lastBuildDate><atom:link href="https://cybercrime.club/tags/salesloft/" rel="self" type="application/rss+xml"/><item><title>The OAuth Pivot: How SaaS-to-SaaS Trust Became the 2026 Supply Chain Attack</title><link>https://cybercrime.club/deep-dives/oauth-pivot-saas-supply-chain-2026/</link><pubDate>Sun, 03 May 2026 10:00:00 -0400</pubDate><guid>https://cybercrime.club/deep-dives/oauth-pivot-saas-supply-chain-2026/</guid><description>Salesloft Drift industrialized it. UNC6040 weaponized vishing into it. Vercel and Context.ai proved it pivots through Google Workspace. The pattern is the same: a third-party SaaS gets popped, the attacker inherits its OAuth grants, and your password reset does absolutely nothing.</description></item></channel></rss>