
Connected apps are now the #1 attack surface in Salesforce. And recent breaches prove it. After hackers exploited OAuth approvals to steal data from more than 200 companies, securing connected apps is no longer optional. Most orgs still have self-authorized apps, dormant apps with active tokens, and no enforced admin controls, leaving the door wide open for attackers.
Hubbl breaks down how modern OAuth-based attacks work, where your Salesforce org is most vulnerable, and what Salesforce’s 2025 connected-app changes mean for your security posture. We’ll break down the difference between installed packages and connected apps, show you how to quickly identify risky apps, enforce “admin approved users only,” and shrink your attack surface in minutes using Hubbl’s Connected App Intelligence.
In this webinar, we cover: