Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • The Hacker News
  • AI-Powered SaaS Security: Keeping Pace with an Expanding Attack Surface
  • The Hacker News

AI-Powered SaaS Security: Keeping Pace with an Expanding Attack Surface

[email protected] The Hacker News Published: March 25, 2025 | Updated: March 25, 2025 4 min read
0 views
AI-Powered SaaS Security

Organizations now use an average of 112 SaaS applications—a number that keeps growing. In a 2024 study, 49% of 644 respondents who frequently used Microsoft 365 believed that they had less than 10 apps connected to the platform, despite the fact that aggregated data indicated over 1,000+ Microsoft 365 SaaS-to-SaaS connections on average per deployment. And that’s just one major SaaS provider. Imagine other unforeseen critical security risks:

  • Each SaaS app has unique security configurations—making misconfigurations a top risk.
  • Business-critical apps (CRM, finance, and collaboration tools) store vast amounts of sensitive data, making them prime targets for attackers.
  • Shadow IT and third-party integrations introduce hidden vulnerabilities that often go unnoticed.
  • Large and small third-party AI service providers (e.g. audio/video transcription service) may not comply with legal and regulatory requirements, or properly test and review code.

Major SaaS providers also have thousands of developers pushing changes every day. Understanding each SaaS app, assessing risks, and securing configurations is overwhelming and inhumanly possible. And much of it is just noise. Perhaps nothing malicious is going on at scale, but small details can often be overlooked.

Traditional security approaches simply cannot scale to meet these demands, leaving organizations exposed to potential breaches.

AI: The Only Way to Keep Up

The complexity of SaaS security is outpacing the resources and effort needed to secure it. AI is no longer optional, it’s essential. AI-driven security solutions like AskOmni by AppOmni—which combine Generative AI (or GenAI) and advanced analytics—are transforming SaaS security by:

âś“ Delivering instant security insights through conversational AI.

âś“ Investigating security events efficiently.

âś“ Turning complex SaaS security questions into clear, actionable answers.

âś“ Visualizing risks for deeper understanding.

✓ Breaking language barriers—multi-lingual support enables security teams to interact with AI in Japanese, French, and English. With multi-lingual support, teams worldwide can interact with security data in their native language—enhancing accessibility and response times.

For example, with its ability to stitch together context from disparate data points, AskOmni can notify administrators about issues caused by overprovisioning of privileges, taking into account access patterns, sensitive data, or compliance requirements, and guide them through the remediation process. Beyond typical threat notifications, AskOmni alerts administrators to new threats, explaining potential consequences and offering prioritized remediation steps.

The Power of AI + Data Depth

High-quality data is the fuel that powers GenAI, but it’s often in short supply. While GenAI is increasingly used to create synthetic data for simulations, detection testing, or red-teaming exercises, the quality of that data determines the effectiveness of the outcomes.

Generative models require clean, relevant, and unbiased datasets to avoid producing inaccurate or misleading results. That’s a major challenge in cybersecurity domains where high-fidelity threat intel, logs, and labeled incident data are scarce or siloed.

For instance, building a GenAI model to simulate cloud breach scenarios demands access to detailed, context-rich telemetry—something that’s not always available due to privacy concerns or lack of standardized formats.

But GenAI can be a powerful tool that can automate threat research to accelerate incident reporting, helping streamline workflows for researchers, engineers, and analysts alike. Its success, however, depends on solving the data quality and availability gap first.

In SaaS security, finding fast, actionable answers traditionally means sifting through data, which can be time-consuming and requires expertise.

AI is only as effective as the data it analyzes. The ability to analyze security events allows AI to provide deep visibility into SaaS environments and detect threats with greater accuracy. Security teams benefit from AI’s ability to prioritize risks, correlate complex security observations, and provide recommendations grounded in real-world expertise.

With 101+ million users secured and 2+ billion security events processed daily, AppOmni ensures:

  • Deep visibility into SaaS environments
  • Accurate risk detection and prioritization
  • Actionable security insights grounded in expertise

Real-World Impact: AI in Action

A global enterprise recently leveraged AI to assess its complex SaaS environment. With just a few prompts, AskOmni efficiently analyzed the system and highlighted key areas for focus. AskOmni provided the following insights that one customer was able to immediately action and remediate:

  • An application bypassing IP restrictions: a critical misconfiguration.
  • Unauthorized self-authorization in Salesforce: a major security gap.
  • Outdated high-risk applications: flagged before they could be exploited.

Without AI, identifying these risks would have taken hours or been missed entirely.

The Present and Future Belongs to AI-Driven SaaS Security

AI is not just enhancing the security of SaaS applications — it’s redefining what is possible. Organizations using AI-powered security tools will gain a critical edge in protecting their data and staying ahead of cyber threats.

Stop searching, start asking. Get SaaS security answers with AppOmni.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter ď‚™ and LinkedIn to read more exclusive content we post.

About The Author

[email protected] The Hacker News

See author's posts

Original post here

What do you feel about this?

  • The Hacker News

Post navigation

Previous: 300 Arrested in Crackdown on Cybercrime Rings in Africa
Next: Hacker Conversations: Frank Trezza – From Phreaker to Pentester

Author's Other Posts

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Related Stories

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
nist-cve.jpg
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

[email protected] The Hacker News April 17, 2026 0 1
europol.jpg
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

[email protected] The Hacker News April 17, 2026 0 0

Trending Now

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions nist-cve.jpg 5
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

April 17, 2026 0 1
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts europol.jpg 6
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

April 17, 2026 0 0
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation apachemq.jpg 7
  • The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

April 17, 2026 0 0

You may have missed

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
Copyright © 2026 All rights reserved. | MoreNews by AF themes.