
With AI making it’s way into virtually every SaaS application, AI discovery extends far beyond chat prompts and purpose-built AI tools.

With AI making it’s way into virtually every SaaS application, AI discovery extends far beyond chat prompts and purpose-built AI tools.

Nudge Security is the only SaaS management platform that discovers up to two years of historical SaaS spend within minutes of starting a free trial.

Nudge Security is the only SaaS management platform that discovers up to two years of historical SaaS spend within minutes of starting a free trial.

A critical vulnerability in GitHub Copilot Chat (”CamoLeak”) allowed attackers to silently exfiltrate private repository content and secrets.

A critical vulnerability in GitHub Copilot Chat (”CamoLeak”) allowed attackers to silently exfiltrate private repository content and secrets.

Learn how OpenAI’s AgentKit and Agent Builder work—and what security teams need to know to build safe, governed AI agents that protect enterprise data.

Learn how OpenAI’s AgentKit and Agent Builder work—and what security teams need to know to build safe, governed AI agents that protect enterprise data.

IBM's annual report reveals that while global breach costs have declined for the first time in five years, a new threat has emerged: shadow AI.

IBM's annual report reveals that while global breach costs have declined for the first time in five years, a new threat has emerged: shadow AI.

What does the rapid pace of AI adoption mean for cybersecurity leaders as they grapple with AI security and governance?

What does the rapid pace of AI adoption mean for cybersecurity leaders as they grapple with AI security and governance?

Shadow AI is just the latest form of shadow IT. Learn why a SaaS-first security approach gives you the visibility and control to manage AI risks at scale.

Shadow AI is just the latest form of shadow IT. Learn why a SaaS-first security approach gives you the visibility and control to manage AI risks at scale.

Learn how our AI dashboard and dedicated playbooks help you to visualize and manage AI adoption at scale across your organization.

Learn how our AI dashboard and dedicated playbooks help you to visualize and manage AI adoption at scale across your organization.

Noma Labs disclosed a critical vulnerability chain in Salesforce Agentforce that allowed adversaries to exfiltrate sensitive CRM data.

Noma Labs disclosed a critical vulnerability chain in Salesforce Agentforce that allowed adversaries to exfiltrate sensitive CRM data.

The Salesforce breach exposed serious SaaS supply chain risks. Learn how OAuth integrations create blind spots and what to do about them.

The Salesforce breach exposed serious SaaS supply chain risks. Learn how OAuth integrations create blind spots and what to do about them.

Attackers stole OAuth tokens from the Salesloft Drift app to bypass MFA and exfiltrate Salesforce data from hundreds of organizations.

Attackers stole OAuth tokens from the Salesloft Drift app to bypass MFA and exfiltrate Salesforce data from hundreds of organizations.

Marek TĂłth presented at DEF CON 33 a new attack technique called DOM-based Extension Clickjacking that impacts popular browser-based password manager extensions.

Marek TĂłth presented at DEF CON 33 a new attack technique called DOM-based Extension Clickjacking that impacts popular browser-based password manager extensions.

AI is no longer limited to prompts and file uploads. With MCP and embedded AI in SaaS apps, corporate data exposure is accelerating. Learn what this means for security and governance.

AI is no longer limited to prompts and file uploads. With MCP and embedded AI in SaaS apps, corporate data exposure is accelerating. Learn what this means for security and governance.

Discover how agentic AI is reshaping enterprise security and governance. Learn the risks, workforce impacts, and steps to stay ahead.

Discover how agentic AI is reshaping enterprise security and governance. Learn the risks, workforce impacts, and steps to stay ahead.

As the nature of work evolves, avoid falling victim to the sunk cost fallacy of CASB.

As the nature of work evolves, avoid falling victim to the sunk cost fallacy of CASB.

Security researchers at Koi Security have uncovered a large-scale, multi-faceted cybercrime campaign dubbed GreedyBear.

Security researchers at Koi Security have uncovered a large-scale, multi-faceted cybercrime campaign dubbed GreedyBear.

From cutting SaaS costs to managing AI use, discover how Nudge Security customers use nudges to improve security outcomes and change workforce behavior.

From cutting SaaS costs to managing AI use, discover how Nudge Security customers use nudges to improve security outcomes and change workforce behavior.

A critical vulnerability was discovered in the Base44 vibe coding platform, recently acquired by Wix.

A critical vulnerability was discovered in the Base44 vibe coding platform, recently acquired by Wix.

On March 20, 2025, global hacking group HellCat launched a widespread ransomware attack specifically targeting Jira servers.

On March 20, 2025, global hacking group HellCat launched a widespread ransomware attack specifically targeting Jira servers.

A widespread phishing campaign has recently targeted nearly 12,000 GitHub repositories with fake “Security Alert” issues.

A widespread phishing campaign has recently targeted nearly 12,000 GitHub repositories with fake “Security Alert” issues.

Microsoft Threat Intelligence revealed that Silk Typhoon is exploiting stolen API keys, OAuth credentials, and PAM credentials in supply chain attacks.

Microsoft Threat Intelligence revealed that Silk Typhoon is exploiting stolen API keys, OAuth credentials, and PAM credentials in supply chain attacks.

Midnight Blizzard has been actively targeting organizations across various sectors since at least 2021.

Midnight Blizzard has been actively targeting organizations across various sectors since at least 2021.

A security incident has been identified involving Amazon’s Q Developer Extension for Visual Studio Code (VSC), version 1.84.0.

A security incident has been identified involving Amazon’s Q Developer Extension for Visual Studio Code (VSC), version 1.84.0.

Learn how to discover, assess, and remove unauthorized Otter AI accounts with Nudge Security's AI security tools.

Learn how to discover, assess, and remove unauthorized Otter AI accounts with Nudge Security's AI security tools.

A browser-based security solution can deliver powerful, real-time security insights and engagement as your workforce uses SaaS and GenAI apps. But it's not a silver bullet.

A browser-based security solution can deliver powerful, real-time security insights and engagement as your workforce uses SaaS and GenAI apps. But it's not a silver bullet.

High-Severity Data Exposure Vulnerability Identified in ServiceNow Platform (Count(er) Strike)

High-Severity Data Exposure Vulnerability Identified in ServiceNow Platform (Count(er) Strike)
