
New research analyzes real-world AI adoption, integrations, and data exposure across enterprise environments.

New research analyzes real-world AI adoption, integrations, and data exposure across enterprise environments.

With AI making it’s way into virtually every SaaS application, AI discovery extends far beyond chat prompts and purpose-built AI tools.

With AI making it’s way into virtually every SaaS application, AI discovery extends far beyond chat prompts and purpose-built AI tools.

How to streamline IAM, starting with a complete inventory of every and SaaS app that’s been introduced into your organization.

How to streamline IAM, starting with a complete inventory of every and SaaS app that’s been introduced into your organization.

How to expose shadow IT, eliminate SaaS sprawl, and take control of your supply chain.

How to expose shadow IT, eliminate SaaS sprawl, and take control of your supply chain.

Not all SaaS discovery methods are created equal. Learn the pros and cons of different approaches and how Nudge Security delivers full visibility on Day One.

Not all SaaS discovery methods are created equal. Learn the pros and cons of different approaches and how Nudge Security delivers full visibility on Day One.

The Salesforce breach exposed serious SaaS supply chain risks. Learn how OAuth integrations create blind spots and what to do about them.

The Salesforce breach exposed serious SaaS supply chain risks. Learn how OAuth integrations create blind spots and what to do about them.

SaaS management platforms provide organizations with centralized visibility, control, and security for all their SaaS applications.

SaaS management platforms provide organizations with centralized visibility, control, and security for all their SaaS applications.

Attackers stole OAuth tokens from the Salesloft Drift app to bypass MFA and exfiltrate Salesforce data from hundreds of organizations.

Attackers stole OAuth tokens from the Salesloft Drift app to bypass MFA and exfiltrate Salesforce data from hundreds of organizations.

Marek TĂłth presented at DEF CON 33 a new attack technique called DOM-based Extension Clickjacking that impacts popular browser-based password manager extensions.

Marek TĂłth presented at DEF CON 33 a new attack technique called DOM-based Extension Clickjacking that impacts popular browser-based password manager extensions.

Discover how agentic AI is reshaping enterprise security and governance. Learn the risks, workforce impacts, and steps to stay ahead.

Discover how agentic AI is reshaping enterprise security and governance. Learn the risks, workforce impacts, and steps to stay ahead.

As the nature of work evolves, avoid falling victim to the sunk cost fallacy of CASB.

As the nature of work evolves, avoid falling victim to the sunk cost fallacy of CASB.

Security researchers at Koi Security have uncovered a large-scale, multi-faceted cybercrime campaign dubbed GreedyBear.

Security researchers at Koi Security have uncovered a large-scale, multi-faceted cybercrime campaign dubbed GreedyBear.

A practitioner's guide to running an AI risk assessment in order to safeguard organizational data and reputation.

A practitioner's guide to running an AI risk assessment in order to safeguard organizational data and reputation.

From cutting SaaS costs to managing AI use, discover how Nudge Security customers use nudges to improve security outcomes and change workforce behavior.

From cutting SaaS costs to managing AI use, discover how Nudge Security customers use nudges to improve security outcomes and change workforce behavior.

A critical vulnerability was discovered in the Base44 vibe coding platform, recently acquired by Wix.

A critical vulnerability was discovered in the Base44 vibe coding platform, recently acquired by Wix.

On March 20, 2025, global hacking group HellCat launched a widespread ransomware attack specifically targeting Jira servers.

On March 20, 2025, global hacking group HellCat launched a widespread ransomware attack specifically targeting Jira servers.

A widespread phishing campaign has recently targeted nearly 12,000 GitHub repositories with fake “Security Alert” issues.

A widespread phishing campaign has recently targeted nearly 12,000 GitHub repositories with fake “Security Alert” issues.

Microsoft Threat Intelligence revealed that Silk Typhoon is exploiting stolen API keys, OAuth credentials, and PAM credentials in supply chain attacks.

Microsoft Threat Intelligence revealed that Silk Typhoon is exploiting stolen API keys, OAuth credentials, and PAM credentials in supply chain attacks.

Midnight Blizzard has been actively targeting organizations across various sectors since at least 2021.

Midnight Blizzard has been actively targeting organizations across various sectors since at least 2021.

A security incident has been identified involving Amazon’s Q Developer Extension for Visual Studio Code (VSC), version 1.84.0.

A security incident has been identified involving Amazon’s Q Developer Extension for Visual Studio Code (VSC), version 1.84.0.

Learn how to discover, assess, and remove unauthorized Otter AI accounts with Nudge Security's AI security tools.

Learn how to discover, assess, and remove unauthorized Otter AI accounts with Nudge Security's AI security tools.

A browser-based security solution can deliver powerful, real-time security insights and engagement as your workforce uses SaaS and GenAI apps. But it's not a silver bullet.

A browser-based security solution can deliver powerful, real-time security insights and engagement as your workforce uses SaaS and GenAI apps. But it's not a silver bullet.

High-Severity Data Exposure Vulnerability Identified in ServiceNow Platform (Count(er) Strike)

High-Severity Data Exposure Vulnerability Identified in ServiceNow Platform (Count(er) Strike)

Security researchers from Google and Citizen Lab have identified a sophisticated phishing campaign that targets prominent academics and critics of Russia.

Security researchers from Google and Citizen Lab have identified a sophisticated phishing campaign that targets prominent academics and critics of Russia.

Asana identified a data exposure bug within its Model Context Protocol (MCP) server on June 4, 2025.

Asana identified a data exposure bug within its Model Context Protocol (MCP) server on June 4, 2025.

Proofpoint researchers have identified an ongoing and active account takeover (ATO) campaign active since December 2024.

Proofpoint researchers have identified an ongoing and active account takeover (ATO) campaign active since December 2024.
