{"id":69068,"date":"2023-07-24T06:00:00","date_gmt":"2023-07-24T13:00:00","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=69068"},"modified":"2023-07-25T13:53:44","modified_gmt":"2023-07-25T20:53:44","slug":"salesforce-bug-bounty-event","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/","title":{"rendered":"Virtual Meets Reality: Why Salesforce Joined Forces with 100 of the World&#8217;s Top Hackers"},"content":{"rendered":"\n<p>With online aliases like <a href=\"http:\/\/hackerone.com\/82af5ddffbb795\" target=\"_blank\" rel=\"noreferrer noopener\">@82af5ddffbb<\/a><a href=\"http:\/\/hackerone.com\/82af5ddffbb795\">795<\/a> and the ability to work anywhere there\u2019s a WiFi connection, hackers can operate in total secrecy.&nbsp;<\/p>\n\n\n\n<p>However, part of how Salesforce builds trusted relationships with its network of <a href=\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-program-swinnen\/\" target=\"_blank\" rel=\"noreferrer noopener\">ethical hackers<\/a> involves getting to know who is on the other side of the keyboard. That\u2019s one reason why last month, the <a href=\"https:\/\/www.salesforce.com\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/\" target=\"_blank\" rel=\"noreferrer noopener\">Salesforce Bug Bounty program<\/a> helped bring this virtual world together in person to participate in a <a href=\"https:\/\/www.hackerone.com\/vulnerability-management\/zoom-salesforce-ethical-hackers\" target=\"_blank\" rel=\"noreferrer noopener\">live hacking event<\/a>, hosted by <a href=\"http:\/\/www.hackerone.com\" target=\"_blank\" rel=\"noreferrer noopener\">HackerOne<\/a>. Salesforce and HackerOne invited over 100 of the world&#8217;s top ethical hackers to &#8220;break into&#8221; select Salesforce products and uncover potential security concerns at CodeNode in London. The hackers competed in a series of hacking competitions, including &#8220;Vigilante,&#8221; &#8220;Exterminator,&#8221; and &#8220;Best Collaboration.<\/p>\n\n\n\n<p>Throughout the event, Salesforce <a href=\"https:\/\/leaderboards.hackerone.live\/lhe-h1-4420-salesforce-uk-2023\" target=\"_blank\" rel=\"noreferrer noopener\">awarded<\/a> over $480,000 in bounties \u2014 with individual payouts as high as $32,000 \u2014 in exchange for over 220 suspected <a href=\"https:\/\/www.csoonline.com\/article\/572701\/12-steps-to-building-a-top-notch-vulnerability-management-program.html\" target=\"_blank\" rel=\"noreferrer noopener\">vulnerability reports<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-putting-a-face-to-a-screen-name\">Putting a face to a screen name<\/h2>\n\n\n\n<p>Ethical hackers, or security researchers, are authorized to hack products and systems to uncover programming flaws or security concerns before any malicious hackers can find and exploit them.&nbsp;<\/p>\n\n\n\n<p>Joe is one such hacker \u2014 the man behind the screen name <a href=\"http:\/\/hackerone.com\/82af5ddffbb795\" target=\"_blank\" rel=\"noreferrer noopener\">@82af5ddffbb795<\/a>. New to the Salesforce ethical hacker network, he emerged as one of the top performers from the event, winning the coveted title of \u201cVigilante,\u201d or Most Valuable Hacker. While he prefers to maintain his anonymity online, he regularly participates in live hacking events because of the value the in-person connection brings.&nbsp;<\/p>\n\n\n\n<p>\u201cI&#8217;ve been a bug bounty hacker for 11 years, and I always learn something new at in-person events,\u201d he said. \u201cThe engineers at Salesforce were invaluable in clarifying complex details which helped me in finding vulnerabilities. Together, we made Salesforce more secure, I learned a lot of new techniques and tricks, and the bounties were great, too!\u201d&nbsp;<\/p>\n\n\n\n<p>\u201cThe ethical hacking community, unlike malicious hackers, benefits from knowledge-sharing and building trust among one another,\u201d Joe said. \u201cSure, we all compete for cash rewards, but the ultimate goal is to thwart potential threats, and it&#8217;s something we all work towards together.&#8221;<\/p>\n\n\n\n<p>Another hacker, Elamaran Vengatraman, aka <a href=\"http:\/\/hackerone.com\/egrep\" target=\"_blank\" rel=\"noreferrer noopener\">@egrep<\/a>, was one of the top bounty earners from the event and submitted reports that were awarded \u201cMost Impactful\u201d and \u201cMost Unique.\u201d&nbsp;<\/p>\n\n\n\n<p>\u201cRecognition and appreciation fuel the fire within us, inspiring us to push boundaries and achieve greater heights,\u201d he said. \u201cThe actions of the Salesforce team demonstrate their profound respect for researchers and their commitment to fostering innovation. I\u2019ve always liked the quote, \u2018Leave one bug alive and the systems are never safe,\u2019 because it means this type of ongoing collaboration is critical for protecting people and their data.\u201d&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Benefits beyond the bounty<\/h2>\n\n\n\n<p>Building relationships with and expanding Salesforce\u2019s ethical hacker network was just one benefit of the in-person collaboration. Identifying and addressing the high volume of potential vulnerabilities in such a short amount of time was another key element.&nbsp;<\/p>\n\n\n\n<p>\u201cWe had all hands on deck, so our engineering team was able to start resolving an issue as soon as it was reported,\u201d said Lindsey Swartz, Security Program Manager at Salesforce. \u201cThat was one of the most valuable aspects of being together in person \u2014 the finding, the fixing, and then verifying the fix internally and externally, all in real time.\u201d&nbsp;<\/p>\n\n\n\n<p>The virtual aspect of the Bug Bounty program makes it one of the company\u2019s most scalable and efficient security measures, with the ability to simultaneously enlist ethical hackers across the globe for 24\/7 testing. However, this can sometimes lead to delayed communication between time zones.&nbsp;<\/p>\n\n\n\n<p>\u201cWhen I participate virtually from Japan, I often receive responses to the reports I send after 1 a.m. my time, making in-depth conversations difficult,\u201d said <a href=\"https:\/\/hackerone.com\/ryotak\" target=\"_blank\" rel=\"noreferrer noopener\">@RyotaK<\/a>, who received the title of \u201cExterminator,\u201d or Most Impactful Hacker, at the event. \u201cBy meeting in person with the Salesforce team, we were able to discuss difficult problems and provide proofs of concept in real time.\u201d<\/p>\n\n\n\n<p>Although the Salesforce security team hosts monthly debriefs with ethical hackers to discuss their findings, this level of access to their thinking was unique.&nbsp;<\/p>\n\n\n\n<p>\u201cWe had the opportunity to look over their shoulders and see how hackers work in real time,\u201d said Swartz. \u201cWe\u2019ve worked with many of these researchers for years, but this was the first time since 2019 we\u2019ve had the opportunity to meet them face to face, sit in the room with them, and see how they collaborate with and complement one another\u2019s skill sets to discover even more impactful bugs than they might individually.\u201d<\/p>\n\n\n\n<p>\u201cWe could see multiple hackers\u2019 screens in a room all at once, and it was eye-opening to see each of their nuanced approaches, said Andrew Leeth, Director of Product Security at Salesforce. \u201cWith the constantly evolving threat landscape, these first-hand learnings are critical for getting inside the mind of hackers \u2014 especially how they are leveraging AI \u2014 to help reinforce our internal security efforts.\u201d.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bug Bounties by the numbers<\/h2>\n\n\n\n<p>Salesforce launched its bug bounty program in 2015 \u2013 one of the first enterprise organizations to do so \u2013 and the initiative continues to be one of its most impactful security programs. In 2022, the Salesforce and Slack Bug Bounty Programs awarded over $2.9 million in bounties, with individual payouts of up to $48,000. Since the program\u2019s inception, Salesforce has awarded $15.1 million in total bounties.&nbsp;<\/p>\n\n\n\n<p>Salesforce continuously evolves its bug bounty program, engaging with more ethical hackers to protect nearly 100% of the company\u2019s growing product portfolio and to facilitate hacker-powered testing of many products earlier in their development cycles.<\/p>\n\n\n\n<p>To inquire about participation in Salesforce\u2019s invitation-only bug bounty program, contact security@salesforce.com<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Explore further<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Learn more about <a href=\"https:\/\/www.salesforce.com\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/\" target=\"_blank\" rel=\"noreferrer noopener\">Salesforce\u2019s Bug Bounty program<\/a><\/li>\n\n\n\n<li>Hear from one of Salesforce\u2019s top ethical hackers about his <a href=\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-program-swinnen\/\" target=\"_blank\" rel=\"noreferrer noopener\">bug bounty experience<\/a><\/li>\n\n\n\n<li>Check out Salesforce\u2019s cybersecurity tips and resources <a href=\"https:\/\/security.salesforce.com\/cybersecurity-awareness-month\/?d=cta-body-promo-8\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>With online aliases like @82af5ddffbb795 and the ability to work anywhere there\u2019s a WiFi connection, hackers can operate in total secrecy.&nbsp; However, part of how Salesforce builds trusted relationships with its network of ethical hackers involves getting to know who is on the other side of the keyboard. That\u2019s one reason why last month, the [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":69078,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"sf_subhead":"","sf_i18n_disclaimer":false,"_jetpack_memberships_contains_paid_content":false,"alternateThumbnailId":0,"sf_product_cta_id":0,"footnotes":""},"categories":[1],"tags":[],"sf_content_type":[1728],"sf_theme":[1912],"sf_topic":[1726],"sf_product":[],"sf_industry":[],"sf_role":[],"sf_multimedia_asset":[],"sf_location":[1798],"sf_collection":[],"sf_visibility":[],"coauthors":[],"class_list":["post-69068","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","sf_content_type-snapshots","sf_theme-digital-transformation","sf_topic-digital-transformation","sf_location-global"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Virtual Meets Reality: Why Salesforce Joined Forces with 100 of the World&#039;s Top Hackers - Salesforce<\/title>\n<meta name=\"description\" content=\"With online aliases like @82af5ddffbb795 and the ability to work anywhere there\u2019s a WiFi connection, hackers can operate in total secrecy.&nbsp; However,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Virtual Meets Reality: Why Salesforce Joined Forces with 100 of the World&#039;s Top Hackers\" \/>\n<meta property=\"og:description\" content=\"With online aliases like @82af5ddffbb795 and the ability to work anywhere there\u2019s a WiFi connection, hackers can operate in total secrecy.&nbsp; However,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/salesforce\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-24T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-25T20:53:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2023\/07\/HackingEvent.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@salesforcenews\" \/>\n<meta name=\"twitter:site\" content=\"@salesforcenews\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Virtual Meets Reality: Why Salesforce Joined Forces with 100 of the World&#8217;s Top Hackers\",\"datePublished\":\"2023-07-24T13:00:00+00:00\",\"dateModified\":\"2023-07-25T20:53:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/\"},\"wordCount\":984,\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2023\/07\/HackingEvent.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/\",\"url\":\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/\",\"name\":\"Virtual Meets Reality: Why Salesforce Joined Forces with 100 of the World's Top Hackers - Salesforce\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2023\/07\/HackingEvent.jpg\",\"datePublished\":\"2023-07-24T13:00:00+00:00\",\"dateModified\":\"2023-07-25T20:53:44+00:00\",\"description\":\"With online aliases like @82af5ddffbb795 and the ability to work anywhere there\u2019s a WiFi connection, hackers can operate in total secrecy.&nbsp; However,\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2023\/07\/HackingEvent.jpg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2023\/07\/HackingEvent.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/news\/#website\",\"url\":\"https:\/\/www.salesforce.com\/news\/\",\"name\":\"Salesforce\",\"description\":\"Get the latest Salesforce press releases, announcements, stories, and media contacts. See today\u2019s CRM news.\",\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.salesforce.com\/news\/#organization\",\"name\":\"Salesforce\",\"url\":\"https:\/\/www.salesforce.com\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.salesforce.com\/news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2020\/08\/default.jpg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2020\/08\/default.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Salesforce\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/news\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/salesforce\/\",\"https:\/\/x.com\/salesforcenews\",\"https:\/\/www.linkedin.com\/company\/salesforce\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Virtual Meets Reality: Why Salesforce Joined Forces with 100 of the World's Top Hackers - Salesforce","description":"With online aliases like @82af5ddffbb795 and the ability to work anywhere there\u2019s a WiFi connection, hackers can operate in total secrecy.&nbsp; However,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/","og_locale":"en_US","og_type":"article","og_title":"Virtual Meets Reality: Why Salesforce Joined Forces with 100 of the World's Top Hackers","og_description":"With online aliases like @82af5ddffbb795 and the ability to work anywhere there\u2019s a WiFi connection, hackers can operate in total secrecy.&nbsp; However,","og_url":"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/","og_site_name":"Salesforce","article_publisher":"https:\/\/www.facebook.com\/salesforce\/","article_published_time":"2023-07-24T13:00:00+00:00","article_modified_time":"2023-07-25T20:53:44+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2023\/07\/HackingEvent.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@salesforcenews","twitter_site":"@salesforcenews","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/"},"author":{"name":"","@id":""},"headline":"Virtual Meets Reality: Why Salesforce Joined Forces with 100 of the World&#8217;s Top Hackers","datePublished":"2023-07-24T13:00:00+00:00","dateModified":"2023-07-25T20:53:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/"},"wordCount":984,"publisher":{"@id":"https:\/\/www.salesforce.com\/news\/#organization"},"image":{"@id":"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2023\/07\/HackingEvent.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/","url":"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/","name":"Virtual Meets Reality: Why Salesforce Joined Forces with 100 of the World's Top Hackers - Salesforce","isPartOf":{"@id":"https:\/\/www.salesforce.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2023\/07\/HackingEvent.jpg","datePublished":"2023-07-24T13:00:00+00:00","dateModified":"2023-07-25T20:53:44+00:00","description":"With online aliases like @82af5ddffbb795 and the ability to work anywhere there\u2019s a WiFi connection, hackers can operate in total secrecy.&nbsp; However,","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/#primaryimage","url":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2023\/07\/HackingEvent.jpg","contentUrl":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2023\/07\/HackingEvent.jpg","width":1200,"height":675},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/news\/#website","url":"https:\/\/www.salesforce.com\/news\/","name":"Salesforce","description":"Get the latest Salesforce press releases, announcements, stories, and media contacts. See today\u2019s CRM news.","publisher":{"@id":"https:\/\/www.salesforce.com\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.salesforce.com\/news\/#organization","name":"Salesforce","url":"https:\/\/www.salesforce.com\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.salesforce.com\/news\/#\/schema\/logo\/image\/","url":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2020\/08\/default.jpg","contentUrl":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2020\/08\/default.jpg","width":1200,"height":630,"caption":"Salesforce"},"image":{"@id":"https:\/\/www.salesforce.com\/news\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/salesforce\/","https:\/\/x.com\/salesforcenews","https:\/\/www.linkedin.com\/company\/salesforce\/"]}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/news\/wp-content\/uploads\/sites\/3\/2023\/07\/HackingEvent.jpg","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/news","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/posts\/69068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/comments?post=69068"}],"version-history":[{"count":3,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/posts\/69068\/revisions"}],"predecessor-version":[{"id":69083,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/posts\/69068\/revisions\/69083"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/media\/69078"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/media?parent=69068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/categories?post=69068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/tags?post=69068"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_content_type?post=69068"},{"taxonomy":"sf_theme","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_theme?post=69068"},{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_topic?post=69068"},{"taxonomy":"sf_product","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_product?post=69068"},{"taxonomy":"sf_industry","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_industry?post=69068"},{"taxonomy":"sf_role","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_role?post=69068"},{"taxonomy":"sf_multimedia_asset","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_multimedia_asset?post=69068"},{"taxonomy":"sf_location","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_location?post=69068"},{"taxonomy":"sf_collection","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_collection?post=69068"},{"taxonomy":"sf_visibility","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/sf_visibility?post=69068"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/news\/wp-json\/wp\/v2\/coauthors?post=69068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}