
New research analyzes real-world AI adoption, integrations, and data exposure across enterprise environments.

New research analyzes real-world AI adoption, integrations, and data exposure across enterprise environments.

A newly disclosed Google OAuth vulnerability allows former employees to retain access to corporate resources like Slack and Zoom, even after suspending their corporate Google accounts. Here’s what it means for your SaaS security posture and how Nudge Security can help.

A newly disclosed Google OAuth vulnerability allows former employees to retain access to corporate resources like Slack and Zoom, even after suspending their corporate Google accounts. Here’s what it means for your SaaS security posture and how Nudge Security can help.

While the convenience of integration can boost productivity, the hidden dangers and cybersecurity risks can be significant.

While the convenience of integration can boost productivity, the hidden dangers and cybersecurity risks can be significant.

Learn how our AI dashboard and dedicated playbooks help you to visualize and manage AI adoption at scale across your organization.

Learn how our AI dashboard and dedicated playbooks help you to visualize and manage AI adoption at scale across your organization.

Noma Labs disclosed a critical vulnerability chain in Salesforce Agentforce that allowed adversaries to exfiltrate sensitive CRM data.

Noma Labs disclosed a critical vulnerability chain in Salesforce Agentforce that allowed adversaries to exfiltrate sensitive CRM data.

With AI making it’s way into virtually every SaaS application, AI discovery extends far beyond chat prompts and purpose-built AI tools.

With AI making it’s way into virtually every SaaS application, AI discovery extends far beyond chat prompts and purpose-built AI tools.

How to streamline IAM, starting with a complete inventory of every and SaaS app that’s been introduced into your organization.

How to streamline IAM, starting with a complete inventory of every and SaaS app that’s been introduced into your organization.

How to expose shadow IT, eliminate SaaS sprawl, and take control of your supply chain.

How to expose shadow IT, eliminate SaaS sprawl, and take control of your supply chain.

Not all SaaS discovery methods are created equal. Learn the pros and cons of different approaches and how Nudge Security delivers full visibility on Day One.

Not all SaaS discovery methods are created equal. Learn the pros and cons of different approaches and how Nudge Security delivers full visibility on Day One.

The Salesforce breach exposed serious SaaS supply chain risks. Learn how OAuth integrations create blind spots and what to do about them.

The Salesforce breach exposed serious SaaS supply chain risks. Learn how OAuth integrations create blind spots and what to do about them.

SaaS management platforms provide organizations with centralized visibility, control, and security for all their SaaS applications.

SaaS management platforms provide organizations with centralized visibility, control, and security for all their SaaS applications.

Attackers stole OAuth tokens from the Salesloft Drift app to bypass MFA and exfiltrate Salesforce data from hundreds of organizations.

Attackers stole OAuth tokens from the Salesloft Drift app to bypass MFA and exfiltrate Salesforce data from hundreds of organizations.

Marek TĂłth presented at DEF CON 33 a new attack technique called DOM-based Extension Clickjacking that impacts popular browser-based password manager extensions.

Marek TĂłth presented at DEF CON 33 a new attack technique called DOM-based Extension Clickjacking that impacts popular browser-based password manager extensions.

Discover how agentic AI is reshaping enterprise security and governance. Learn the risks, workforce impacts, and steps to stay ahead.

Discover how agentic AI is reshaping enterprise security and governance. Learn the risks, workforce impacts, and steps to stay ahead.

As the nature of work evolves, avoid falling victim to the sunk cost fallacy of CASB.

As the nature of work evolves, avoid falling victim to the sunk cost fallacy of CASB.

Security researchers at Koi Security have uncovered a large-scale, multi-faceted cybercrime campaign dubbed GreedyBear.

Security researchers at Koi Security have uncovered a large-scale, multi-faceted cybercrime campaign dubbed GreedyBear.

A practitioner's guide to running an AI risk assessment in order to safeguard organizational data and reputation.

A practitioner's guide to running an AI risk assessment in order to safeguard organizational data and reputation.

From cutting SaaS costs to managing AI use, discover how Nudge Security customers use nudges to improve security outcomes and change workforce behavior.

From cutting SaaS costs to managing AI use, discover how Nudge Security customers use nudges to improve security outcomes and change workforce behavior.

A critical vulnerability was discovered in the Base44 vibe coding platform, recently acquired by Wix.

A critical vulnerability was discovered in the Base44 vibe coding platform, recently acquired by Wix.

On March 20, 2025, global hacking group HellCat launched a widespread ransomware attack specifically targeting Jira servers.

On March 20, 2025, global hacking group HellCat launched a widespread ransomware attack specifically targeting Jira servers.

A widespread phishing campaign has recently targeted nearly 12,000 GitHub repositories with fake “Security Alert” issues.

A widespread phishing campaign has recently targeted nearly 12,000 GitHub repositories with fake “Security Alert” issues.

Microsoft Threat Intelligence revealed that Silk Typhoon is exploiting stolen API keys, OAuth credentials, and PAM credentials in supply chain attacks.

Microsoft Threat Intelligence revealed that Silk Typhoon is exploiting stolen API keys, OAuth credentials, and PAM credentials in supply chain attacks.

Midnight Blizzard has been actively targeting organizations across various sectors since at least 2021.

Midnight Blizzard has been actively targeting organizations across various sectors since at least 2021.

A security incident has been identified involving Amazon’s Q Developer Extension for Visual Studio Code (VSC), version 1.84.0.

A security incident has been identified involving Amazon’s Q Developer Extension for Visual Studio Code (VSC), version 1.84.0.

Learn how to discover, assess, and remove unauthorized Otter AI accounts with Nudge Security's AI security tools.

Learn how to discover, assess, and remove unauthorized Otter AI accounts with Nudge Security's AI security tools.

A browser-based security solution can deliver powerful, real-time security insights and engagement as your workforce uses SaaS and GenAI apps. But it's not a silver bullet.

A browser-based security solution can deliver powerful, real-time security insights and engagement as your workforce uses SaaS and GenAI apps. But it's not a silver bullet.
