Resource Hub
A collection of our latest articles, videos, news, and more.
-
New Research on Salesforce Industry Clouds: 0-days, Insecure Defaults, and Exploitable Misconfigurations
AppOmni’s latest research reveals 20+ OmniStudio security flaws, including 5 CVEs affecting Salesforce industry clouds. Learn how misconfigurations expose sensitive data and…
-
OAuth Tokens: The Danger Behind the Commvault Breach
Discover what went wrong in the Commvault breach: How AppOmni’s powerful SaaS security platform steps in to stop threats before they strike.
-
Microsoft Power Pages: Data Exposure Reviewed
Learn about a data exposure risk in Microsoft Power Pages due to misconfigured access controls, highlighting the need for better security and…
-
How to Detect Session Hijacking in Your SaaS Applications
In part 3 of this series, Justin Blackburn shares best practices to detect session hijacking and how AppOmni does this by flagging…
-
Enterprise ServiceNow Knowledge Bases at Risk: Extensive Data Exposures Uncovered
Read the blog to learn about ServiceNow’s Knowledge Base data exposure risks and how to mitigate these issues.
-
Potential Widespread Data Exposure Analysis: Oracle NetSuite
Read the blog for an analysis on the potential data exposure of Oracle NetSuite with a thorough understanding of NetSuite access control…
-
Step-by-Step Guidance to Secure SaaS Environments including Snowflake and ServiceNow
Learn the chain of events behind the Snowflake breach and get guidance to secure your SaaS environments including Snowflake & ServiceNow.
-
How to Simulate Session Hijacking in Your SaaS Applications
In this second blog of our technical series on session hijacking, learn about the challenges associated with detecting compromised sessions and more.
-
Salesforce Community Cloud Scanner
Learn how to secure your Salesforce Community websites from data exposure risks with support from the AO Labs threat research team.
-
Midnight Blizzard and Cloudflare-Atlassian Cybersecurity Incidents
Spear-phishing, misconfigurations and vulnerabilities in third-party app integrations demonstrate the complex security challenges facing IT systems.