Tag: saas
-
Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries
A threat actor known as Storm-2657 has been observed hijacking employee accounts with the end goal of diverting salary payments to attacker-controlled accounts.”Storm-2657 is actively targeting a range of U.S.-based organizations, particularly employees in sectors like higher education, to gain access to third-party human resources (HR) software as a service (SaaS) platforms like Workday,” the…
-
Disaster Recovery und Business Continuity effektiv planen
Tags: ai, api, backup, business, ciso, cloud, compliance, cyber, cyberattack, cyersecurity, gartner, Internet, mail, ransomware, resilience, risk, risk-management, saas, service, software, strategy, technology, tool, vulnerabilitySechs Schritte sollten CISOs für einen erfolgreichen Disaster-Recovery- und Business-Continuity-Plan beachten.Die Grundprinzipien der Disaster Recovery (DR) und der Business Continuity sind seit Jahrzehnten weitgehend unverändert:Risiken identifizieren,die Auswirkungen auf das Geschäft analysieren,Wiederanlaufzeiten (Recovery Time Objectives, RTOs) festlegen,einen Sicherungs- und Wiederherstellungsplan erstellen undregelmäßige Tests durchführen.In der Vergangenheit lagen die Daten auf Servern vor Ort, Cyberbedrohungen waren weniger…
-
SaaS Breaches Start with Tokens – What Security Teams Must Watch
Token theft is a leading cause of SaaS breaches. Discover why OAuth and API tokens are often overlooked and how security teams can strengthen token hygiene to prevent attacks.Most companies in 2025 rely on a whole range of software-as-a-service (SaaS) applications to run their operations. However, the security of these applications depends on small pieces…
-
When Your SaaS Feels Human at Scale
Discover how AI-driven communication brings empathy and personality to SaaS, helping automation feel more human, personal, and emotionally intelligent. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/when-your-saas-feels-human-at-scale/
-
Salesforce Refuses to Pay Ransom to Data-Stealing Hackers
Salesforce is refusing a demand by the hackers behind that widespread data-stealing attacks on its customers, which threatened to release massive amounts of the data unless the SaaS vendor negotiated a ransom payment. In an email, Salesforce reportedly told customers about its refusal to pay and offered them its support. First seen on securityboulevard.com Jump…
-
Salesforce Refuses to Pay Ransom to Data-Stealing Hackers
Salesforce is refusing a demand by the hackers behind that widespread data-stealing attacks on its customers, which threatened to release massive amounts of the data unless the SaaS vendor negotiated a ransom payment. In an email, Salesforce reportedly told customers about its refusal to pay and offered them its support. First seen on securityboulevard.com Jump…
-
Salesforce Refuses to Pay Ransom to Data-Stealing Hackers
Salesforce is refusing a demand by the hackers behind that widespread data-stealing attacks on its customers, which threatened to release massive amounts of the data unless the SaaS vendor negotiated a ransom payment. In an email, Salesforce reportedly told customers about its refusal to pay and offered them its support. First seen on securityboulevard.com Jump…
-
77% of Employees Share Company Secrets on ChatGPT Compromising Enterprise Policies
In an era where AI and SaaS applications underpin daily workflows, organizations face an unprecedented challenge: the invisible exfiltration of sensitive information. Traditional, file-based data loss prevention (DLP) measures were designed for attachments and downloads, but today’s risk landscape extends far beyond simple file movements. As employees increasingly rely on Generative AI tools and unmanaged…
-
77% of Employees Share Company Secrets on ChatGPT Compromising Enterprise Policies
In an era where AI and SaaS applications underpin daily workflows, organizations face an unprecedented challenge: the invisible exfiltration of sensitive information. Traditional, file-based data loss prevention (DLP) measures were designed for attachments and downloads, but today’s risk landscape extends far beyond simple file movements. As employees increasingly rely on Generative AI tools and unmanaged…
-
77% of Employees Share Company Secrets on ChatGPT Compromising Enterprise Policies
In an era where AI and SaaS applications underpin daily workflows, organizations face an unprecedented challenge: the invisible exfiltration of sensitive information. Traditional, file-based data loss prevention (DLP) measures were designed for attachments and downloads, but today’s risk landscape extends far beyond simple file movements. As employees increasingly rely on Generative AI tools and unmanaged…
-
Autonomous AI hacking and the future of cybersecurity
Tags: ai, cyber, cyberattack, cybersecurity, defense, framework, hacking, offense, open-source, programming, reverse-engineering, risk, risk-management, saas, software, tool, update, vulnerabilityThe AI-assisted evolution of cyberdefense: AI technologies can benefit defenders as well. We don’t know how the different technologies of cyber-offense and cyber-defense will be amenable to AI enhancement, but we can extrapolate a possible series of overlapping developments.Phrase One: The Transformation of the Vulnerability Researcher. AI-based hacking benefits defenders as well as attackers. In…
-
Autonomous AI hacking and the future of cybersecurity
Tags: ai, cyber, cyberattack, cybersecurity, defense, framework, hacking, offense, open-source, programming, reverse-engineering, risk, risk-management, saas, software, tool, update, vulnerabilityThe AI-assisted evolution of cyberdefense: AI technologies can benefit defenders as well. We don’t know how the different technologies of cyber-offense and cyber-defense will be amenable to AI enhancement, but we can extrapolate a possible series of overlapping developments.Phrase One: The Transformation of the Vulnerability Researcher. AI-based hacking benefits defenders as well as attackers. In…
-
New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise
For years, security leaders have treated artificial intelligence as an “emerging” technology, something to keep an eye on but not yet mission-critical. A new Enterprise AI and SaaS Data Security Report by AI & Browser Security company LayerX proves just how outdated that mindset has become. Far from a future concern, AI is already the…
-
New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise
For years, security leaders have treated artificial intelligence as an “emerging” technology, something to keep an eye on but not yet mission-critical. A new Enterprise AI and SaaS Data Security Report by AI & Browser Security company LayerX proves just how outdated that mindset has become. Far from a future concern, AI is already the…
-
New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise
For years, security leaders have treated artificial intelligence as an “emerging” technology, something to keep an eye on but not yet mission-critical. A new Enterprise AI and SaaS Data Security Report by AI & Browser Security company LayerX proves just how outdated that mindset has become. Far from a future concern, AI is already the…
-
Hackers Exploit Legitimate Commands to Breach Databases
In recent years, adversaries have abandoned traditional malware in favor of “living-off-the-land” operations against cloud and SaaS environments. Rather than deploying custom ransomware binaries, many threat actors now exploit misconfigured database services”, leveraging only built-in commands to steal, destroy, or encrypt data. Victims often discover their data missing or inaccessible, replaced only by ransom notes…
-
75% of Orgs. Had a SaaS Security Incident Despite High Confidence in Their Security. Here’s Why.
Most orgs. felt secure, but 75% had a SaaS incident. Learn why, and how to bridge the SaaS security confidence gap. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/75-of-orgs-had-a-saas-security-incident-despite-high-confidence-in-their-security-heres-why/
-
Shadow AI is the new shadow IT: Why a SaaS-first approach wins
Shadow AI is just the latest form of shadow IT. Learn why a SaaS-first security approach gives you the visibility and control to manage AI risks at scale. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/shadow-ai-is-the-new-shadow-it-why-a-saas-first-approach-wins/
-
Disaster recovery and business continuity: How to create an effective plan
Tags: access, ai, api, attack, backup, business, cloud, container, control, cyberattack, data, detection, email, gartner, identity, ransomware, risk, saas, security-incident, service, software, strategy, supply-chain, technology, tool, vulnerabilityStep 2: Identify risk, and locate all your data: Identifying risk in a large, distributed enterprise is a complex task. Risks are everywhere, starting with cyberattacks (including insider attacks), and encompass human error, system failures (hardware, software, network), natural disasters, and third-party vulnerabilities associated with supply chains, cloud service providers, and SaaS providers.When Forrester asked…
-
Disaster recovery and business continuity: How to create an effective plan
Tags: access, ai, api, attack, backup, business, cloud, container, control, cyberattack, data, detection, email, gartner, identity, ransomware, risk, saas, security-incident, service, software, strategy, supply-chain, technology, tool, vulnerabilityStep 2: Identify risk, and locate all your data: Identifying risk in a large, distributed enterprise is a complex task. Risks are everywhere, starting with cyberattacks (including insider attacks), and encompass human error, system failures (hardware, software, network), natural disasters, and third-party vulnerabilities associated with supply chains, cloud service providers, and SaaS providers.When Forrester asked…
-
Passwordless 101 for SaaS: Magic Links, OTP, or Passkeys?
Discover magic links, OTPs, and passkeys for SaaS apps. Compare security, UX, and rollout strategies to choose the right passwordless method. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/passwordless-101-for-saas-magic-links-otp-or-passkeys/
-
Sichere Bewältigung von Compliance-Herausforderungen bei der Datenaufbewahrung durch SaaS-Drittlösungen
Die Einhaltung von Richtlinien zur Datenaufbewahrung sind für Unternehmen unerlässlich, denn sie sorgen dafür, dass wertvolle Informationen sicher gespeichert und Branchenvorschriften egal wie komplex sie sind eingehalten werden. Diese Governance-Frameworks legen fest, wie Unternehmen sensible Daten verwalten von deren Erstellung und aktiven Nutzung bis hin zur Archivierung oder Vernichtung. Heute verlassen sich […] First seen…
-
Evolving Enterprise Defense to Secure the Modern AI Supply Chain
The world of enterprise technology is undergoing a dramatic shift. Gen-AI adoption is accelerating at an unprecedented pace, and SaaS vendors are embedding powerful LLMs directly into their platforms. Organizations are embracing AI-powered applications across every function, from marketing and development to finance and HR. This transformation unlocks innovation and efficiency, but it also First…
-
Evolving Enterprise Defense to Secure the Modern AI Supply Chain
The world of enterprise technology is undergoing a dramatic shift. Gen-AI adoption is accelerating at an unprecedented pace, and SaaS vendors are embedding powerful LLMs directly into their platforms. Organizations are embracing AI-powered applications across every function, from marketing and development to finance and HR. This transformation unlocks innovation and efficiency, but it also First…
-
Cloud Security Alliance führt neues SaaS-Framework ein
Tags: business, ceo, cloud, compliance, cyberattack, firewall, framework, international, ISO-27001, risk, saas, zero-trustMit dem SaaS Security Capability Framework (SSCF) hat die Cloud Security Alliance (CSA) einen neunen Sicherheitsstandart festgelegt.Das SaaS Security Capability Framework (SSCF) der Cloud Security Alliance (CSA) soll SaaS-Anbietern dabei helfen, Zero-Trust-Prinzipien in ihre Umgebungen zu integrieren und Kunden angesichts steigender Risiken durch Dritte konsistentere Sicherheitskontrollen zu bieten. Die Veröffentlichung der Leitlinien folgt auf die…
-
Cybersecurity Snapshot: CISA Highlights Vulnerability Management Importance in Breach Analysis, as Orgs Are Urged To Patch Cisco Zero-Days
Tags: 2fa, access, advisory, api, attack, authentication, breach, business, cisa, cisco, cloud, control, credentials, crime, cve, cyber, cybersecurity, data, defense, endpoint, exploit, fido, finance, firewall, framework, github, grc, guide, identity, incident response, infrastructure, Internet, ISO-27001, kev, law, lessons-learned, malicious, malware, mfa, mitigation, monitoring, network, open-source, phishing, privacy, ransomware, risk, saas, scam, security-incident, service, soc, software, supply-chain, tactics, threat, update, vpn, vulnerability, vulnerability-management, worm, zero-dayCISA’s takeaways of an agency hack include a call for timely vulnerability patching. Plus, Cisco zero-day bugs are under attack, patch now. Meanwhile, the CSA issued a framework for SaaS security. And get the latest on the npm breach, the ransomware attack that disrupted air travel and more! Here are six things you need to…

