Zendesk Exposes 10,000 Accounts to Unknown Third Party
Cloud-based customer service company Zendesk notified customers that account information for 10,000 users was accessed prior to November 2016.
In a note posted Wednesday, Zendesk said email addresses, user names, and phone numbers were accessed for customers and users of its Support and Chat products. Zendesk Support is the company’s customer support ticketing service. Chat is Zendesk’s live messaging service used on websites and mobile devices.
Maarten Van Horenbeeck, chief information security officer of Zendesk said in a statement Wednesday the company became aware of the accessed data on September 24 when a third party notified them of the leak. The bulk of the account data accessed included PII data tied to its Support and Chat service, but also included expired trial accounts and accounts that are no longer active.
The company said for that smaller subset of 700 customers, the unknown third parties accessed Transport Layer Security encryption keys provided to Zendesk by customers along with configuration settings of apps installed from the Zendesk app marketplace or private customer apps.
“This may include integration keys used by those apps to authenticate against third-party services,” wrote Van Horenbeeck.
The company, who counts Airbnb, Stanley Black and Decker and Fossil as customers, said affected users are advised to “rotate all credentials for the respective app” used during the vulnerable time period.
“If you uploaded a TLS certificate to Zendesk prior to November 1st of 2016 which is still valid, we recommend you upload a new certificate, and revoke the old one,” Van Horenbeeck said. “API Tokens in Chat do not need to be rotated.”
He added that there is no indication that other authentication credentials were accessed.
The rotation of credentials will impact a larger group of customers and products that share authentication with the Zendesk Support service. Those include the Guide, Talk and Explore Zendesk products. When users log in to one of the products they will be prompted to reset their passwords.
Additional precautions are being made by Zendesk for its Chat APIs for customers that haven’t changed their password since 2016.
“Note that if you utilize basic authentication into the Zendesk or Chat APIs through your password, you will need to reestablish your connection to those APIs upon changing your password. This password rotation will not impact the use of API or OAuth tokens,” according to the note.
Access of Zendesk data by a third party may also have implications under the General Data Protection Regulation (GDPR). Zendesk is alerting customers they may have to report this incident to their Data Protection Authority (DPA). A DPA is an agency within each European Union country responsible for GDPR assistance and enforcement.
“Zendesk’s customers are the Data Controllers of Service Data, and Zendesk is a Data Processor of that Service Data when it is performing the Zendesk Service. This means that it is up to each customer to determine if it is required under Article 33 of the General Data Protection Regulation 2016/679 (GDPR) to notify its Supervisory Authority, depending on whether the relevant risk thresholds have been met under the GDPR,” according to Zendesk.
Industry: Cyber Security
- IAM Consultant- OKTA
- upto €90,000 plus benefits
I am looking for an experienced IAM process Manager to help drive forward a series of IAM implementation for a global Manufacturing business, Ideally you will be skilled with Okta and have knowledge of PAM Solutions, You will be responsible for: Driving the design and continuous improvement of complex IAM solutions in close collaboration with business partners Consult on the optimisation of IAM processes and design proper IT-based solutions to meet availability and quality targets Define technical specifications for SW-development (standards, design patterns, test cases, scenarios) and manage the life cycle of designed solutions Actively scan for relevant innovations and new technologies to identify further potential for improving IAM solutions and processes using OKTA Analyse new features of the regular Okta releases We are looking for someone with strong IAM experience as an Architect, Analyst, Technical Engineer, or similar role in the Identity and Security domain Experience with relevant certifications in development/administration, design and configuration of the Okta IAM platforms Familiar with LCM - joiners, movers, leavers, application federation - SAML, OIDC, SCIM and many other IAM terms Good mix of competences in IAM business process and project management concepts and tools e.g., ServiceNow, Jira, PRINCE2, SCRUM (agile)
- SAP Security Consultant
- upto €70,000 plus benefits
I am looking for an experienced SAP Security Consultant. The ideal candidate will have a strong understanding of SAP security concepts and be able to apply them to real-world scenarios. ideally you will also have experience with Securitybridge or Onapsis, or a similar SAP security tool. Your responsibilities will include: Reviewing and auditing SAP security settings and controls Identifying and remediating security vulnerabilities Implementing security best practices Educating users on SAP security Experience experience in SAP security Experience with Securitybridge or Onapsis, or a similar SAP security tool would be very advantageous Strong understanding of SAP security concepts Excellent problem-solving and analytical skills Excellent communication and presentation skills Fluent in French & English
- Post Grad MSc Cyber security - Junior Cyber Risk Analyst wanted. UK
- United Kingdom
- Entry role
The perfect start to your new Cyber Security Career. Post Graduate Cyber Risk Analyst Wanted. Are you are fresh from earning your Cyber Security MSc and eager to start your career in Cyber Security? We are looking for a recent post graduate to join a forward thinking Cyber Security Consultancy for the ideal entry role into Cyber Security. Whilst employed industry experience is not expected, as full training and support will be provided, a history of recent education in Cyber Security / Cyber Risk is essential. We are looking for someone with an inquisitive mind, who is confident to ask the right questions and who isn't afraid to challenge the status quo. Superb communication skills are a must (in person, written and verbal) This is a UK based role that is remote first with monthly travel (1-2 a month) to meet with the team and in time to meet clients. If you aren’t available to travel this isn’t the opportunity. We are unable to provide VISA sponsorship as there will be a requirement to achieve Security clearance If you're adaptable, open to fresh perspectives, and excited to be part of a forward-thinking team and looking for an opportunity to help make a difference in a Cyber consulting role, this opportunity is for you. For more information apply here……
- Microsoft Exchange Contractor | London | OUTSIDE IR35 | SC Cleared
- OUTSIDE IR35
Microsoft Exchange Contractor | London | OUTSIDE IR35 | SC Cleared • We require someone that has experience of migration exchange from windows server 2012 to 2019. • In depth understand of On-Prem exchange server management and deployment. • Experience migrating On-Prem exchange servers from 2012 upwards. • Secure Email Gateway experience essential Due to the nature of the requirement the individual must be commutable to London 2-3 days a week.