Skip to content
Book a Demo

Bite Sized Breaches Blog

| March 21, 2025

The Hidden Dangers Lurking in Your SaaS Integrations

In Part 1 of our conversation, we explored why SaaS API logging is a mess—why logs are incomplete, misleading, or locked behind paywalls—and how..

Read More

Previous Posts

Headshot of Adam Burt, Head of Research at Vorlon, with text

The Hidden Dangers Lurking in Your SaaS Integrations

| March 21, 2025

In Part 1 of our conversation, we explored why SaaS API logging is a mess—why logs are incomplete, misleading, or locked behind paywalls—and how..

Read More

Man with head in hand, sitting in front of laptop computer, stressed by news of malicious fake OAuth app in Github

New OAuth Phishing Attack on GitHub:  What Security Teams Must Know

| March 20, 2025

Cybercriminals have once again exploited OAuth tokens to hijack accounts—this time targeting GitHub developers through fake security alerts...

Read More

Headshot of Adam Burt, Vorlon's head of research, with text Q&A with Adam Burt Part 1

Q&A with Adam Burt Part 1: Why SaaS Breach Investigations Are So Hard

| March 14, 2025

The explosion of SaaS applications has transformed how businesses operate, but SaaS security remains an underappreciated risk. To get to the heart of..

Read More

A web of metallic threads and connectors, with one shining in red to indicate compromise of a third part application which can spread to the connected applications

How Silk Typhoon Exploits IT Supply Chains and What You Can Do

| March 7, 2025

Silk Typhoon is a China-linked advanced persistent threat (APT) group that has escalated its cyber operations, now actively targeting IT supply..

Read More

A street in New Orleans overlaid with words FS-ISAC 2025 Spring Summit, New Orleans, LA

Vorlon, Securing Financial SaaS Ecosystems, Sponsors FS-ISAC 2025

| March 5, 2025

The financial sector relies on SaaS applications, APIs, and third-party integrations for efficiency and innovation. But these same connections create..

Read More

RSA 2025 Conference

Discover Vorlon at RSAC 2025: A New Approach to SaaS Ecosystem Security

| February 24, 2025

Find us in the Early Stage Expo Hall The countdown to RSA Conference 2025 is on, and Vorlon is thrilled to be part of one of the most anticipated..

Read More

Grubhub data breach impacting personal information. Grubhub logo displayed over a meal.

Grubhub Data Breach: A Costly Meal for Customers, Drivers, and Merchants

| February 14, 2025

Grubhub, a major food delivery service, has recently disclosed a data breach affecting customers, drivers, and merchants. The GrubHub data breach..

Read More

Doctor working through a secure API to communicate with staff

APIs in Healthcare: Transforming Data Sharing, Security, & Compliance

| February 10, 2025

Hospitals and healthcare providers increasingly leverage APIs to enhance data exchange between Electronic Health Records (EHRs) and various..

Read More

ViVE logo over scene in Nashville with music stage and crowd

Meet Vorlon at ViVE 2025: Addressing Third-Party Risks in Healthcare IT

| February 5, 2025

Are you heading to ViVE 2025? So are we! You’ll find Vorlon Security in the Cybersecurity Pavilion at Booth V-2727, where we will showcase how we..

Read More

The Postman Data Leak

The Postman Data Leak - Exposing the Hidden Risks of API Development

| January 30, 2025

How poor practices in API and third-party app security leave sensitive data vulnerable The Postman data leak has revealed significant security risks..

Read More

Otelier Breach: When Hotel Management Checks Out

| January 29, 2025

Hotel management platform Otelier experienced a significant data breach after cybercriminals accessed its Amazon S3 cloud storage. The breach..

Read More

Snowflake breach response playbook

Snowflake Breach Response Playbook

| January 27, 2025

Summary of Breach In May 2024, Snowflake became aware of unauthorized access to some of its customer accounts, with threat-related activity going..

Read More

The Stiiizy Data Breach: Lessons for Mitigating Third-Party Security Risks

| January 22, 2025

STIIIZY, a renowned cannabis brand in California, experienced a significant data breach when their point-of-sale (POS) vendor was targeted by..

Read More

BeyondTrust Breach: Implications for U.S. Treasury and beyond

BeyondTrust Breach: Implications for U.S. Treasury and beyond

| January 8, 2025

BeyondTrust, a leading provider of privileged access management (PAM) solutions, recently disclosed a significant security incident involving its..

Read More

Vorlon’s Perspective on the Gartner Report: Adapt Your Third-Party API Security to 3 Specific Use Cases

| November 18, 2024

Two days after I joined Vorlon Security as their VP of Marketing, Gartner included Vorlon as a representative vendor in their report: Adapt Your..

Read More

Better Together For All Parties: Salt Security and Vorlon

| October 16, 2024

Introduction API security has a broad range of definitions depending on who you ask. More often than not, API security is thought of as the APIs that..

Read More

The API Security Checklist: What to Review Before Integrating a Third-Party API

| October 9, 2024

Integrating third-party APIs into your application can significantly boost functionality and efficiency. However, without proper security evaluation,..

Read More

Internal vs. Third-Party APIs: Who Would Win in a Fight!?

| October 4, 2024

On the digital battlefield where APIs (Application Programming Interfaces) reign supreme, knowing the strengths and weaknesses of internal versus..

Read More

Mean Time To What!?

| September 25, 2024

Are you numb to the exorbitant number of security incidents happening to enterprises large and small on a daily basis yet? Sadly, the number gets..

Read More

Capgemini's Data Disaster: When Hackers Turned Consulting into Chaos

| September 23, 2024

Introduction A new data breach has surfaced, and this time, it involves global IT services giant Capgemini. A hacker going by the name "grep" claims..

Read More

Fortinet Hit by Cyber Attack: Third-Party Breach Affects Asia-Pacific Customers

| September 20, 2024

Introduction Fortinet, a leading global cybersecurity firm, which provides solutions like firewalls and endpoint protection disclosed a data breach..

Read More

Avis Car Rental Breach: Looks Like Cars Weren't the Only Thing Avis Was Giving Away

| September 18, 2024

What Happened? Last month, Avis noticed that hundreds of thousands of customer data (including PII) had been exfiltrated. Hackers gained access to an..

Read More

Better Together: Vorlon + Tines

| September 16, 2024

Summary It’s no secret, your enterprise’s third-party application landscape is complicated. Most enterprises rely heavily on third-party vendors and..

Read More

Securing More with Less: Navigating Cybersecurity in a Shrinking Budget Era

| September 10, 2024

Summary In today’s cybersecurity landscape, where security budget growth has slowed compared to the rapid expansions of previous years, organizations..

Read More

Dick's Sporting Goods Breach - And How Vorlon Can Help

| September 4, 2024

What happened? As reported on Bleeping Computer, on August 21, 2024, Dick's Sporting Goods discovered that there was a serious data breach. Bad..

Read More

Put the Car in Gear and Shift Correctly: Highlights From SANS DFIR Summit

| September 3, 2024

Last week, at the SANS DFIR Security Summit, my colleague Mike Cioffi and I had the opportunity to dive deep into an often overlooked but critical..

Read More

HealthEquity Breach - And How Vorlon Can Help

| August 22, 2024

What happened? On March 9th, 2024, hackers gained access to HealthEquity’s systems by leveraging the hijacked credentials of a third-party..

Read More

NYTimes Github Breach - And How Vorlon Can Help

| August 22, 2024

What happened? In January 2024, attackers obtained an exposed GitHub token and accessed NYTimes repositories. Leveraging the exposed secret, the..

Read More

CDK Global's Breach - And How Vorlon Can Help

| August 22, 2024

What happened? In June 2024, CDK Global suffered a breach at the hands of BlackSuit ransomware group, causing them to shut down major data centers..

Read More

Under the Hood: Examining Toyota’s Recent Data Breach

| August 22, 2024

Toyota recently confirmed a data breach originating from a third-party entity, exposing sensitive information on both customers and employees. The..

Read More

Vorlon v2.0 Summary and Highlights

| August 5, 2024

Summary I am very excited to share that Vorlon has just released the newest version of our platform, v2.0! We have listened to feedback from our..

Read More

Behind the Microphone: Insights from Our CISO Series Podcast Episode

| August 5, 2024

The recent CISO Series podcast from David Sparks brought to light a lot of really interesting points about incident response and the challenges that..

Read More

Legos and a built lego castle

From Functionality to Fortification: Securing Third-Party Integrations with Vorlon

| July 31, 2024

Introduction During my early years as an engineer, I was responsible for writing APIs that facilitated seamless integration with third-party services..

Read More

Want to learn more?

Book a Demo