
SaaS sprawl and AI adoption surged in 2025, creating new security challenges. Here are the key product updates we delivered to help teams stay ahead.

SaaS sprawl and AI adoption surged in 2025, creating new security challenges. Here are the key product updates we delivered to help teams stay ahead.

Not all SaaS discovery methods are created equal. Learn the pros and cons of different approaches and how Nudge Security delivers full visibility on Day One.

Not all SaaS discovery methods are created equal. Learn the pros and cons of different approaches and how Nudge Security delivers full visibility on Day One.

The Salesforce breach exposed serious SaaS supply chain risks. Learn how OAuth integrations create blind spots and what to do about them.

The Salesforce breach exposed serious SaaS supply chain risks. Learn how OAuth integrations create blind spots and what to do about them.

SaaS management platforms provide organizations with centralized visibility, control, and security for all their SaaS applications.

SaaS management platforms provide organizations with centralized visibility, control, and security for all their SaaS applications.

Attackers stole OAuth tokens from the Salesloft Drift app to bypass MFA and exfiltrate Salesforce data from hundreds of organizations.

Attackers stole OAuth tokens from the Salesloft Drift app to bypass MFA and exfiltrate Salesforce data from hundreds of organizations.

Marek TĂłth presented at DEF CON 33 a new attack technique called DOM-based Extension Clickjacking that impacts popular browser-based password manager extensions.

Marek TĂłth presented at DEF CON 33 a new attack technique called DOM-based Extension Clickjacking that impacts popular browser-based password manager extensions.

AI is no longer limited to prompts and file uploads. With MCP and embedded AI in SaaS apps, corporate data exposure is accelerating. Learn what this means for security and governance.

AI is no longer limited to prompts and file uploads. With MCP and embedded AI in SaaS apps, corporate data exposure is accelerating. Learn what this means for security and governance.

Discover how agentic AI is reshaping enterprise security and governance. Learn the risks, workforce impacts, and steps to stay ahead.

Discover how agentic AI is reshaping enterprise security and governance. Learn the risks, workforce impacts, and steps to stay ahead.

As the nature of work evolves, avoid falling victim to the sunk cost fallacy of CASB.

As the nature of work evolves, avoid falling victim to the sunk cost fallacy of CASB.

Security researchers at Koi Security have uncovered a large-scale, multi-faceted cybercrime campaign dubbed GreedyBear.

Security researchers at Koi Security have uncovered a large-scale, multi-faceted cybercrime campaign dubbed GreedyBear.

A practitioner's guide to running an AI risk assessment in order to safeguard organizational data and reputation.

A practitioner's guide to running an AI risk assessment in order to safeguard organizational data and reputation.

From cutting SaaS costs to managing AI use, discover how Nudge Security customers use nudges to improve security outcomes and change workforce behavior.

From cutting SaaS costs to managing AI use, discover how Nudge Security customers use nudges to improve security outcomes and change workforce behavior.

A critical vulnerability was discovered in the Base44 vibe coding platform, recently acquired by Wix.

A critical vulnerability was discovered in the Base44 vibe coding platform, recently acquired by Wix.

On March 20, 2025, global hacking group HellCat launched a widespread ransomware attack specifically targeting Jira servers.

On March 20, 2025, global hacking group HellCat launched a widespread ransomware attack specifically targeting Jira servers.

A widespread phishing campaign has recently targeted nearly 12,000 GitHub repositories with fake “Security Alert” issues.

A widespread phishing campaign has recently targeted nearly 12,000 GitHub repositories with fake “Security Alert” issues.

Microsoft Threat Intelligence revealed that Silk Typhoon is exploiting stolen API keys, OAuth credentials, and PAM credentials in supply chain attacks.

Microsoft Threat Intelligence revealed that Silk Typhoon is exploiting stolen API keys, OAuth credentials, and PAM credentials in supply chain attacks.

Midnight Blizzard has been actively targeting organizations across various sectors since at least 2021.

Midnight Blizzard has been actively targeting organizations across various sectors since at least 2021.

A security incident has been identified involving Amazon’s Q Developer Extension for Visual Studio Code (VSC), version 1.84.0.

A security incident has been identified involving Amazon’s Q Developer Extension for Visual Studio Code (VSC), version 1.84.0.

Learn how to discover, assess, and remove unauthorized Otter AI accounts with Nudge Security's AI security tools.

Learn how to discover, assess, and remove unauthorized Otter AI accounts with Nudge Security's AI security tools.

A browser-based security solution can deliver powerful, real-time security insights and engagement as your workforce uses SaaS and GenAI apps. But it's not a silver bullet.

A browser-based security solution can deliver powerful, real-time security insights and engagement as your workforce uses SaaS and GenAI apps. But it's not a silver bullet.

High-Severity Data Exposure Vulnerability Identified in ServiceNow Platform (Count(er) Strike)

High-Severity Data Exposure Vulnerability Identified in ServiceNow Platform (Count(er) Strike)

AI meeting tools like Otter and Fireflies spread fast. Nudge Security helps you uncover and manage the risks.

AI meeting tools like Otter and Fireflies spread fast. Nudge Security helps you uncover and manage the risks.

Missteps like weak MFA enforcement, legacy auth, and excess admin access can open the door to attackers. Here's how to fix them before they’re exploited.

Missteps like weak MFA enforcement, legacy auth, and excess admin access can open the door to attackers. Here's how to fix them before they’re exploited.

Harden your Google Workspace environment with these five essential security settings and configurations.

Harden your Google Workspace environment with these five essential security settings and configurations.

Security researchers from Google and Citizen Lab have identified a sophisticated phishing campaign that targets prominent academics and critics of Russia.

Security researchers from Google and Citizen Lab have identified a sophisticated phishing campaign that targets prominent academics and critics of Russia.

Asana identified a data exposure bug within its Model Context Protocol (MCP) server on June 4, 2025.

Asana identified a data exposure bug within its Model Context Protocol (MCP) server on June 4, 2025.
