#Vercel update. We now know, thanks to Vercel's CEO, that the compromise came by way of the context[.]ai Office Suite, using OAuth tokens collected from a breach last month. Details here:

Vercel confirms breach as hackers claim to be selling stolen data
We now know that the compromised app was context.ai: Several important takeaways in this update from Vercel CEO Guillermo Rauch: The attacker moved from a compromised Google Workspace account to other Vercel infrastructure. The attacker had access to “non-sensitive” environment variables, which are not encrypted at rest. The attacker had access to these. Vercel is still claiming that only a “quite limited” set of users was impacted. Unclear why that’s so. Customers known to be impacted are ...

,
, and
. 

