Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise

Posted on June 9, 2025June 9, 2025 By CWS

Jun 09, 2025The Hacker Information
You don’t want a rogue worker to undergo a breach.
All it takes is a free trial that somebody forgot to cancel. An AI-powered note-taker quietly syncing together with your Google Drive. A private Gmail account tied to a business-critical software. That’s shadow IT. And right now, it’s not nearly unsanctioned apps, but in addition dormant accounts, unmanaged identities, over-permissioned SaaS instruments, and orphaned entry. Most of it slips previous even probably the most mature safety options.
Assume your CASB or IdP covers this? It doesn’t.
They weren’t constructed to catch what’s occurring inside SaaS: OAuth sprawl, shadow admins, GenAI entry, or apps created instantly in platforms like Google Workspace or Slack. Shadow IT is not a visibility difficulty – it’s a full-blown assault floor.
Wing Safety helps safety groups uncover these dangers earlier than they develop into incidents.
Listed here are 5 real-world examples of shadow IT that may very well be quietly bleeding your information.
1. Dormant entry you possibly can’t see, that attackers love to use

The chance: Workers join instruments utilizing only a username and password, with out SSO or centralized visibility. Over time, they cease utilizing the apps, however entry stays, and worse, it’s unmanaged.
The affect: These zombie accounts develop into invisible entry factors into your setting. You possibly can’t implement MFA, monitor utilization, or revoke entry throughout offboarding.
Instance: CISA and world cyber businesses issued a joint advisory warning in 2024 that Russian state-sponsored group APT29 (a part of the SVR) actively targets dormant accounts to realize entry to enterprise and authorities programs. These accounts typically function very best footholds since they go unnoticed, lack MFA, and stay accessible lengthy after they’re not in use.

2. Generative AI quietly studying your emails, recordsdata, and technique

The chance: SaaS apps powered by Generative AI often request broad OAuth permissions with full entry to learn inboxes, recordsdata, calendars, and chats.
The affect: These SaaS apps typically grant extra entry than required, exfiltrate delicate information to 3rd events with unclear information retention and mannequin coaching insurance policies. As soon as entry is granted, there’s no technique to monitor how your information is saved, who has entry internally, or what occurs if the seller is breached or misconfigures entry.
Instance: In 2024, DeepSeek by chance uncovered inner LLM coaching recordsdata containing delicate information because of a misconfigured storage bucket, highlighting the chance of giving third-party GenAI instruments broad entry with out oversight round information safety.

3. Former workers nonetheless maintain admin entry, months after leaving

The chance: When workers onboard new SaaS instruments (particularly outdoors your IdP), they typically are the only real admin. Even after they go away the corporate, their entry stays.
The affect: These accounts can have persistent, privileged entry to firm instruments, recordsdata, or environments, posing a long-term insider threat.
Actual-life instance: A contractor arrange a time-tracking app and linked it to the corporate’s HR system. Months after their contract ended, they nonetheless had admin entry to worker logs.

See what Wing uncovers in your SaaS setting. Discuss with a safety knowledgeable and get a demo.
4. Enterprise-critical apps tied to non-public accounts you don’t management

The chance: Workers typically use their private Gmail, Apple ID, or different unmanaged accounts to join enterprise apps like Figma, Notion, and even Google Drive.
The affect: These accounts exist fully outdoors of IT visibility. In the event that they get compromised, you possibly can’t revoke entry or implement safety insurance policies.
Instance: Within the 2023 Okta buyer assist breach, hackers exploited a service account with out MFA that had entry to Okta’s assist system. The account was lively, unmonitored, and never tied to a particular particular person. Even firms with mature identification programs can miss these blind spots.

5. Shadow SaaS with app-to-app connectivity to your crown jewels

The chance: Workers join unsanctioned SaaS apps on to trusted platforms like Google Workspace, Salesforce, or Slack—with out IT involvement or overview. These app-to-app connections typically request broad API entry and keep lively lengthy after use.
The affect: These integrations create hidden pathways into vital programs. If compromised, they’ll allow lateral motion, permitting attackers to pivot throughout apps, exfiltrate information, or preserve persistence with out triggering conventional alerts.
Instance: A product supervisor related a roadmap software to Jira and Google Drive. The mixing requested broad entry however was forgotten after the challenge ended. When the seller was later breached, attackers used the lingering connection to tug recordsdata from Drive and pivot into Jira, accessing inner credentials and escalation paths. The sort of lateral motion was seen within the 2024 Microsoft breach by Midnight Blizzard, the place attackers leveraged a legacy OAuth app with mailbox entry to evade detection and preserve persistent entry to inner programs.

What are you doing about it?
Shadow IT isn’t only a governance downside—it’s an actual safety hole. And the longer it goes unnoticed, the larger the chance and the extra uncovered your SaaS setting turns into.
Wing Safety robotically discovers SaaS apps, customers, and integrations—mapping human and non-human identities, permissions, and MFA standing—with out brokers or proxies. As soon as the unknown turns into recognized, Wing delivers multi-layered SaaS safety in a single platform, unifying misconfigurations, identification threats, and SaaS dangers right into a single supply of fact. By correlating occasions throughout apps and identities, Wing cuts by the noise, prioritizes what issues, and permits proactive, steady safety.
👉 Get a demo and take management of your SaaS setting – earlier than hackers do.

Discovered this text attention-grabbing? This text is a contributed piece from one among our valued companions. Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:CASB, Covers, IdP, Prove, Risks, Shadow

Post navigation

Previous Post: US Seeks Forfeiture of $7.74M in Cryptocurrency Tied to North Korean IT Workers
Next Post: Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks

Related Posts

Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks The Hacker News
Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks The Hacker News
Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems The Hacker News
New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors The Hacker News
SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version The Hacker News
Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Check App Permissions on Android/iOS
  • New Blitz Malware Attacking Windows Servers to Deploy Monero Miner
  • Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’
  • Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight
  • Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • How to Check App Permissions on Android/iOS
  • New Blitz Malware Attacking Windows Servers to Deploy Monero Miner
  • Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’
  • Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight
  • Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News