AI is no longer limited to prompts and file uploads. With MCP and embedded AI in SaaS apps, corporate data exposure is accelerating. Learn what this means for security and governance.
AI is no longer limited to prompts and file uploads. With MCP and embedded AI in SaaS apps, corporate data exposure is accelerating. Learn what this means for security and governance.
Marek TĂłth presented at DEF CON 33 a new attack technique called DOM-based Extension Clickjacking that impacts popular browser-based password manager extensions.
Marek TĂłth presented at DEF CON 33 a new attack technique called DOM-based Extension Clickjacking that impacts popular browser-based password manager extensions.
Discover how agentic AI is reshaping enterprise security and governance. Learn the risks, workforce impacts, and steps to stay ahead.
Discover how agentic AI is reshaping enterprise security and governance. Learn the risks, workforce impacts, and steps to stay ahead.
Security researchers at Koi Security have uncovered a large-scale, multi-faceted cybercrime campaign dubbed GreedyBear.
Security researchers at Koi Security have uncovered a large-scale, multi-faceted cybercrime campaign dubbed GreedyBear.
From cutting SaaS costs to managing AI use, discover how Nudge Security customers use nudges to improve security outcomes and change workforce behavior.
From cutting SaaS costs to managing AI use, discover how Nudge Security customers use nudges to improve security outcomes and change workforce behavior.
A critical vulnerability was discovered in the Base44 vibe coding platform, recently acquired by Wix.
A critical vulnerability was discovered in the Base44 vibe coding platform, recently acquired by Wix.
A security incident has been identified involving Amazon’s Q Developer Extension for Visual Studio Code (VSC), version 1.84.0.
A security incident has been identified involving Amazon’s Q Developer Extension for Visual Studio Code (VSC), version 1.84.0.
Learn how to discover, assess, and remove unauthorized Otter AI accounts with Nudge Security's AI security tools.
Learn how to discover, assess, and remove unauthorized Otter AI accounts with Nudge Security's AI security tools.
A browser-based security solution can deliver powerful, real-time security insights and engagement as your workforce uses SaaS and GenAI apps. But it's not a silver bullet.
A browser-based security solution can deliver powerful, real-time security insights and engagement as your workforce uses SaaS and GenAI apps. But it's not a silver bullet.
High-Severity Data Exposure Vulnerability Identified in ServiceNow Platform (Count(er) Strike)
High-Severity Data Exposure Vulnerability Identified in ServiceNow Platform (Count(er) Strike)
AI meeting tools like Otter and Fireflies spread fast. Nudge Security helps you uncover and manage the risks.
AI meeting tools like Otter and Fireflies spread fast. Nudge Security helps you uncover and manage the risks.
Missteps like weak MFA enforcement, legacy auth, and excess admin access can open the door to attackers. Here's how to fix them before they’re exploited.
Missteps like weak MFA enforcement, legacy auth, and excess admin access can open the door to attackers. Here's how to fix them before they’re exploited.
Security researchers from Google and Citizen Lab have identified a sophisticated phishing campaign that targets prominent academics and critics of Russia.
Security researchers from Google and Citizen Lab have identified a sophisticated phishing campaign that targets prominent academics and critics of Russia.
Asana identified a data exposure bug within its Model Context Protocol (MCP) server on June 4, 2025.
Asana identified a data exposure bug within its Model Context Protocol (MCP) server on June 4, 2025.
Proofpoint researchers have identified an ongoing and active account takeover (ATO) campaign active since December 2024.
Proofpoint researchers have identified an ongoing and active account takeover (ATO) campaign active since December 2024.
Enrich your understanding of SaaS and AI usage with real-time data and promote safe security practices with browser nudges.
Enrich your understanding of SaaS and AI usage with real-time data and promote safe security practices with browser nudges.
Google Threat Intelligence Group has identified a financially motivated threat actor conducting voice phishing campaigns aimed at breaching Salesforce instances.
Google Threat Intelligence Group has identified a financially motivated threat actor conducting voice phishing campaigns aimed at breaching Salesforce instances.
As HIPAA modernizes its standards for a SaaS & AI-powered world, healthcare organizations require new approaches to safeguarding access to sensitive data.
As HIPAA modernizes its standards for a SaaS & AI-powered world, healthcare organizations require new approaches to safeguarding access to sensitive data.
Since February 2024, an unknown threat actor has seeded 100+ malicious Google Chrome extensions that masquerade as legitimate tools.
Since February 2024, an unknown threat actor has seeded 100+ malicious Google Chrome extensions that masquerade as legitimate tools.
CISA issued an alert on May 22 warning that threat actors had compromised Commvault's Azure-hosted Metallic SaaS backup platform.
CISA issued an alert on May 22 warning that threat actors had compromised Commvault's Azure-hosted Metallic SaaS backup platform.
Microsoft is rolling out a new feature in June 2025 that encourages enterprise users signed into their corporate OneDrive on Windows devices to also sign into their personal OneDrive accounts.
Microsoft is rolling out a new feature in June 2025 that encourages enterprise users signed into their corporate OneDrive on Windows devices to also sign into their personal OneDrive accounts.
Connecting Google Drive to ChatGPT grants extensive permissions, posing risks. Here's how to track activity within Google Workspace, or with Nudge Security.
Connecting Google Drive to ChatGPT grants extensive permissions, posing risks. Here's how to track activity within Google Workspace, or with Nudge Security.
SaaS security isn't just another cybersecurity trend—it's a fundamental recognition that the traditional security paradigm is failing to address modern threats.
SaaS security isn't just another cybersecurity trend—it's a fundamental recognition that the traditional security paradigm is failing to address modern threats.
A recent analysis by Cyera uncovered unexpected behavior within Snowflake’s Cortex AI Search Service, a powerful tool for AI-driven search and retrieval.
A recent analysis by Cyera uncovered unexpected behavior within Snowflake’s Cortex AI Search Service, a powerful tool for AI-driven search and retrieval.
In today's world of distributed workforces and rapid SaaS adoption, organizations need a new approach to technology governance—one that empowers employees while maintaining security.
In today's world of distributed workforces and rapid SaaS adoption, organizations need a new approach to technology governance—one that empowers employees while maintaining security.
Not all SaaS discovery methods are created equal. Learn the pros and cons of different approaches and how Nudge Security delivers full visibility on Day One.
Not all SaaS discovery methods are created equal. Learn the pros and cons of different approaches and how Nudge Security delivers full visibility on Day One.