The Nudge Security team grew up in cybersecurity and spent decades building and growing market-shaping companies, products, and research to protect global organizations against emerging and evolving cyber risks.

A critical vulnerability in GitHub Copilot Chat (”CamoLeak”) allowed attackers to silently exfiltrate private repository content and secrets.
Read more

A critical vulnerability in GitHub Copilot Chat (”CamoLeak”) allowed attackers to silently exfiltrate private repository content and secrets.
Read more

Noma Labs disclosed a critical vulnerability chain in Salesforce Agentforce that allowed adversaries to exfiltrate sensitive CRM data.
Read more

Noma Labs disclosed a critical vulnerability chain in Salesforce Agentforce that allowed adversaries to exfiltrate sensitive CRM data.
Read more

Marek TĂłth presented at DEF CON 33 a new attack technique called DOM-based Extension Clickjacking that impacts popular browser-based password manager extensions.
Read more

Marek TĂłth presented at DEF CON 33 a new attack technique called DOM-based Extension Clickjacking that impacts popular browser-based password manager extensions.
Read more

Security researchers at Koi Security have uncovered a large-scale, multi-faceted cybercrime campaign dubbed GreedyBear.
Read more

Security researchers at Koi Security have uncovered a large-scale, multi-faceted cybercrime campaign dubbed GreedyBear.
Read more

A critical vulnerability was discovered in the Base44 vibe coding platform, recently acquired by Wix.
Read more

A critical vulnerability was discovered in the Base44 vibe coding platform, recently acquired by Wix.
Read more

On March 20, 2025, global hacking group HellCat launched a widespread ransomware attack specifically targeting Jira servers.
Read more

On March 20, 2025, global hacking group HellCat launched a widespread ransomware attack specifically targeting Jira servers.
Read more

A widespread phishing campaign has recently targeted nearly 12,000 GitHub repositories with fake “Security Alert” issues.
Read more

A widespread phishing campaign has recently targeted nearly 12,000 GitHub repositories with fake “Security Alert” issues.
Read more

Microsoft Threat Intelligence revealed that Silk Typhoon is exploiting stolen API keys, OAuth credentials, and PAM credentials in supply chain attacks.
Read more

Microsoft Threat Intelligence revealed that Silk Typhoon is exploiting stolen API keys, OAuth credentials, and PAM credentials in supply chain attacks.
Read more

Midnight Blizzard has been actively targeting organizations across various sectors since at least 2021.
Read more

Midnight Blizzard has been actively targeting organizations across various sectors since at least 2021.
Read more

A security incident has been identified involving Amazon’s Q Developer Extension for Visual Studio Code (VSC), version 1.84.0.
Read more

A security incident has been identified involving Amazon’s Q Developer Extension for Visual Studio Code (VSC), version 1.84.0.
Read more

Security researchers from Google and Citizen Lab have identified a sophisticated phishing campaign that targets prominent academics and critics of Russia.
Read more

Security researchers from Google and Citizen Lab have identified a sophisticated phishing campaign that targets prominent academics and critics of Russia.
Read more

Asana identified a data exposure bug within its Model Context Protocol (MCP) server on June 4, 2025.
Read more

Asana identified a data exposure bug within its Model Context Protocol (MCP) server on June 4, 2025.
Read more

Proofpoint researchers have identified an ongoing and active account takeover (ATO) campaign active since December 2024.
Read more

Proofpoint researchers have identified an ongoing and active account takeover (ATO) campaign active since December 2024.
Read more

Google Threat Intelligence Group has identified a financially motivated threat actor conducting voice phishing campaigns aimed at breaching Salesforce instances.
Read more

Google Threat Intelligence Group has identified a financially motivated threat actor conducting voice phishing campaigns aimed at breaching Salesforce instances.
Read more

Since February 2024, an unknown threat actor has seeded 100+ malicious Google Chrome extensions that masquerade as legitimate tools.
Read more

Since February 2024, an unknown threat actor has seeded 100+ malicious Google Chrome extensions that masquerade as legitimate tools.
Read more

CISA issued an alert on May 22 warning that threat actors had compromised Commvault's Azure-hosted Metallic SaaS backup platform.
Read more

CISA issued an alert on May 22 warning that threat actors had compromised Commvault's Azure-hosted Metallic SaaS backup platform.
Read more

Microsoft is rolling out a new feature in June 2025 that encourages enterprise users signed into their corporate OneDrive on Windows devices to also sign into their personal OneDrive accounts.
Read more

Microsoft is rolling out a new feature in June 2025 that encourages enterprise users signed into their corporate OneDrive on Windows devices to also sign into their personal OneDrive accounts.
Read more

A practitioner's guide to running an AI risk assessment in order to safeguard organizational data and reputation.
Read more

A practitioner's guide to running an AI risk assessment in order to safeguard organizational data and reputation.
Read more

A recent analysis by Cyera uncovered unexpected behavior within Snowflake’s Cortex AI Search Service, a powerful tool for AI-driven search and retrieval.
Read more

A recent analysis by Cyera uncovered unexpected behavior within Snowflake’s Cortex AI Search Service, a powerful tool for AI-driven search and retrieval.
Read more

With RSA around the corner and Black Hat following soon, we set out to find out if security practitioners still find value in these “mega” conferences.
Read more

With RSA around the corner and Black Hat following soon, we set out to find out if security practitioners still find value in these “mega” conferences.
Read more

On March 14, 2025, attackers compromised a popular GitHub action, injecting malicious code to expose sensitive CI/CD secrets within workflow logs.
Read more

On March 14, 2025, attackers compromised a popular GitHub action, injecting malicious code to expose sensitive CI/CD secrets within workflow logs.
Read more

On February 27, 2025, security researchers revealed that LLMs were trained on datasets containing approximately 12,000 live API keys and passwords.
Read more

On February 27, 2025, security researchers revealed that LLMs were trained on datasets containing approximately 12,000 live API keys and passwords.
Read more

On February 27, 2025, security researchers from cybersecurity company Lasso discovered a serious data exposure issue involving Microsoft's Copilot.
Read more

On February 27, 2025, security researchers from cybersecurity company Lasso discovered a serious data exposure issue involving Microsoft's Copilot.
Read more

Proactively find and fix misconfigurations in Okta, Google Workspace, and Microsoft 365 with our new SSPM capabilities.
Read more

Proactively find and fix misconfigurations in Okta, Google Workspace, and Microsoft 365 with our new SSPM capabilities.
Read more

LastPass has reported a social engineering campaign using fake reviews on the Chrome Web Store.
Read more

LastPass has reported a social engineering campaign using fake reviews on the Chrome Web Store.
Read more

On October 30, 2024, a security flaw was detected in Okta’s AD/LDAP Delegated Authentication (DelAuth) service.
Read more

On October 30, 2024, a security flaw was detected in Okta’s AD/LDAP Delegated Authentication (DelAuth) service.
Read more

Attackers have been utilizing DocuSign’s SaaS platform to deliver phishing campaigns that are able to bypass email security checks.
Read more

Attackers have been utilizing DocuSign’s SaaS platform to deliver phishing campaigns that are able to bypass email security checks.
Read more

Threat actors are leveraging fake Google Ads linked to deceptive websites that mimic legitimate download pages.
Read more

Threat actors are leveraging fake Google Ads linked to deceptive websites that mimic legitimate download pages.
Read more

Read a summary of the vulnerability, how it could be exploited, and what to look for to understand if your organization could have been impacted.
Read more

Read a summary of the vulnerability, how it could be exploited, and what to look for to understand if your organization could have been impacted.
Read more

With Nudge Security, GLAAD eliminates 1000+ hours of manual work every year in protecting critical SaaS identities and data.
Read more

With Nudge Security, GLAAD eliminates 1000+ hours of manual work every year in protecting critical SaaS identities and data.
Read more

Learn how we can help you identify and remediate security risks across your Google Workspace and Microsoft 365 environments.
Read more

Learn how we can help you identify and remediate security risks across your Google Workspace and Microsoft 365 environments.
Read more

With Nudge Security, Stravito was able to expand its SaaS security program while cutting costs and improving employee engagement.
Read more

With Nudge Security, Stravito was able to expand its SaaS security program while cutting costs and improving employee engagement.
Read more

An active threat campaign targeting Snowflake customers underscores an all-too-common attack pattern of exploiting users’ cloud and SaaS identities and gaps in MFA coverage.
Read more

An active threat campaign targeting Snowflake customers underscores an all-too-common attack pattern of exploiting users’ cloud and SaaS identities and gaps in MFA coverage.
Read more

With Nudge Security, gridX was able to discover and inventory its cloud and SaaS applications, allowing them to ditch their spreadsheet and easily prepare for compliance certifications.
Read more

With Nudge Security, gridX was able to discover and inventory its cloud and SaaS applications, allowing them to ditch their spreadsheet and easily prepare for compliance certifications.
Read more

A conversation about data and identity with Steve Zalewski, former CISO of Levi Strauss and a seasoned security advisor.
Read more

A conversation about data and identity with Steve Zalewski, former CISO of Levi Strauss and a seasoned security advisor.
Read more

Join our webcast on February 15 to learn how Nudge Security can help you manage SaaS identities and governance at scale.
Read more

Join our webcast on February 15 to learn how Nudge Security can help you manage SaaS identities and governance at scale.
Read more

Tune in to Nudge Newsday Tuesday to see what’s new in our product and how these innovations can help you save time and improve SaaS security and governance.
Read more

Tune in to Nudge Newsday Tuesday to see what’s new in our product and how these innovations can help you save time and improve SaaS security and governance.
Read more
.avif)
Eliminate shadow IT, secure rogue accounts, control costs, and automate tedious tasks.
Read more
.avif)
Eliminate shadow IT, secure rogue accounts, control costs, and automate tedious tasks.
Read more

Who’s using AI in your org? Find out in minutes with our patented method for SaaS discovery.
Read more

Who’s using AI in your org? Find out in minutes with our patented method for SaaS discovery.
Read more

Nudge Security CEO Russ Spitler welcomes Ira Winkler, CISO of CYE Security, to discuss principles for designing a security program that engages employees.
Read more

Nudge Security CEO Russ Spitler welcomes Ira Winkler, CISO of CYE Security, to discuss principles for designing a security program that engages employees.
Read more

Watch our webcast to learn the fundamentals of OAuth risk management using Nudge Security.
Read more

Watch our webcast to learn the fundamentals of OAuth risk management using Nudge Security.
Read more

Nudge Security CEO Russ Spitler welcomes Malcolm Harkins to discuss the balance of risk vs. friction that must be considered when designing a security program.
Read more

Nudge Security CEO Russ Spitler welcomes Malcolm Harkins to discuss the balance of risk vs. friction that must be considered when designing a security program.
Read more
.avif)
Nudge Security CEO Russ Spitler welcomes Tony Simone to discuss how Incident Response has changed with widespread SaaS adoption and SaaS-to-SaaS integrations.
Read more
.avif)
Nudge Security CEO Russ Spitler welcomes Tony Simone to discuss how Incident Response has changed with widespread SaaS adoption and SaaS-to-SaaS integrations.
Read more
.avif)
Nudge Security CEO Russ Spitler welcomes Kunal Anand to discuss the challenges IT and security practitioners face trying to secure their SaaS ecosystem.
Read more
.avif)
Nudge Security CEO Russ Spitler welcomes Kunal Anand to discuss the challenges IT and security practitioners face trying to secure their SaaS ecosystem.
Read more
.avif)
Watch our product demo to learn how Nudge Security helps you manage AI risk effectively and at scale.
Read more
.avif)
Watch our product demo to learn how Nudge Security helps you manage AI risk effectively and at scale.
Read more

Nudge Security CEO Russ Spitler welcomes Dave Anderson to discuss how IT offboarding has changed with the explosion of SaaS and cloud applications.
Read more

Nudge Security CEO Russ Spitler welcomes Dave Anderson to discuss how IT offboarding has changed with the explosion of SaaS and cloud applications.
Read more

Watch our product demo and see how Nudge Security's new playbook reduces employee offboarding time by 90%.
Read more

Watch our product demo and see how Nudge Security's new playbook reduces employee offboarding time by 90%.
Read more

Nudge Security CEO Russ Spitler welcomes Ed Amoroso to discuss how the modern attack surface has changed with the explosion of SaaS adoption.
Read more

Nudge Security CEO Russ Spitler welcomes Ed Amoroso to discuss how the modern attack surface has changed with the explosion of SaaS adoption.
Read more

Watch our demo webcast and see how Nudge Security gives you instant visibility into all SaaS and cloud accounts ever created.
Read more

Watch our demo webcast and see how Nudge Security gives you instant visibility into all SaaS and cloud accounts ever created.
Read more

Watch our product demo and learn how to proactively discover, monitor, and secure your SaaS footprint with Nudge Security.
Read more

Watch our product demo and learn how to proactively discover, monitor, and secure your SaaS footprint with Nudge Security.
Read more

Watch our product demo to learn everything you need to know about Nudge Security in 30 minutes.
Read more

Watch our product demo to learn everything you need to know about Nudge Security in 30 minutes.
Read more

Did the latest SaaS security incidents affect you or your supply chain? Are you sure?
Read more

Did the latest SaaS security incidents affect you or your supply chain? Are you sure?
Read more

Here’s what we’re drinking this holiday season to celebrate a stellar first year at Nudge Security.
Read more

Here’s what we’re drinking this holiday season to celebrate a stellar first year at Nudge Security.
Read more

Watch Dr. Aaron C. Kay and Nudge Security CEO Russell Spitler as they present new research.
Read more

Watch Dr. Aaron C. Kay and Nudge Security CEO Russell Spitler as they present new research.
Read more

Our research report explores the influence of employees’ perception and emotions on security behaviors.
Read more

Our research report explores the influence of employees’ perception and emotions on security behaviors.
Read more

An interview with Castra’s Grant Leonard on how to prepare for the future of SaaS security.
Read more

An interview with Castra’s Grant Leonard on how to prepare for the future of SaaS security.
Read more

Nudge Security is now generally available with a free 14-day trial. Here’s a primer on what we built, why we built it, and why you should give it a whirl.
Read more

Nudge Security is now generally available with a free 14-day trial. Here’s a primer on what we built, why we built it, and why you should give it a whirl.
Read more

We are excited to announce that we recently completed our SOC 2 Type 1 attestation report.
Read more

We are excited to announce that we recently completed our SOC 2 Type 1 attestation report.
Read more

We think the industry needs to do much, much more to address the human element of cybersecurity. This is the story of why we founded Nudge Security.
Read more

We think the industry needs to do much, much more to address the human element of cybersecurity. This is the story of why we founded Nudge Security.
Read more
