AO In The News
-
ShinyHunters Claims Woflow Breach in Supply Chain Hack
ShinyHunters claims a breach of SaaS provider Woflow in a supply-chain attack impacting major brands, highlighting escalating third-party SaaS security risks and…
-
6 Essential Strategies to Defend Against AI-Powered Threat Actors in 2026
Learn six actionable ways organizations can counter AI-driven cybersecurity threats by enhancing policies, detection, response, and overall defenses against AI-enabled attacks.
-
Can Meta Workers See Through Your Ray-Ban Smart Glasses? Here’s What Security Experts Say
Meta’s Ray-Ban smart glasses are drawing fresh privacy scrutiny after investigations revealed that footage users capture (especially when using cloud-linked AI features)…
-
AdExchanger Data Privacy Roundup
Costello sees a broader pattern of SaaS vendors racing to bolt AI onto everything. In that rush, security is a lower priority.
-
New phishing campaign tricks employees into bypassing Microsoft 365 MFA
Cory Michal, CSO at AppOmni, said attacks often leverage OAuth tokens and service/integration identities because they’re a blind spot for many orgs.
-
Identity Crisis: Why SaaS Attacks Are Bypassing Your Best Defenses
To help build a solid foundation for AI adoption, IM firms should source high-quality data, use modern data cloud/hybrid infrastructure, and adopt…
-
Google disrupts Gemini model extraction attempts
Melissa shared, “As model providers add guardrails, attackers may try to extract models in an effort to use their power without guardrails.”
-
Artificial Intelligence security vulnerability uncovered
Aaron Costello with AppOmni tells Good Morning Cleveland anchor Mike Brookbank more about the flaw in the ServiceNow platform.
-
Panera Bread breach: ShinyHunters claims hack of 14 million customers’ data
“This aligns closely with Okta’s recent warnings about vishing-driven SSO compromise targeting Okta, Microsoft, and Google.” — Cory Michal, AppOmni.
-
10 ways AI can inflict unprecedented damage in 2026
“By trying to make AI as powerful as it can be, organizations may misconfigure settings, leading to overpermissions and data exposure.” —…









