Skip to main content
NEW: RSAC 2026 NHI Field Report. How Non-Human Identity became cybersecurity's central axis
Back to Blog
Tag

DevSecOps

13 posts
NHI Kill Chain: 8 Ways Your Credentials Are Already Compromised (And the One Fix That Addresses All of Them)
Apr 30, 2026

NHI Kill Chain: 8 Ways Your Credentials Are Already Compromised (And the One Fix That Addresses All of Them)

Eight types of dangerous NHI credentials. One framework to find, classify, and eliminate them all. The complete NHI Kill Chain series summary with Cyber Kill Chain and MITRE ATT&CK mapping.

Ben Kim
Ben Kim
Founder & CEO
AITU CTF Final 2026 Writeup
Apr 29, 2026

AITU CTF Final 2026 Writeup

Full writeup of the AITU CTF Final (April 25-26, 2026), a HackCity-format competition. We walk through exploiting DMZ hosts via XXE, SSTI, and SQLi, pivoting into the DEV segment through AD lateral movement, escaping a privileged Docker container via cgroup abuse, and breaching a healthcare system through JWT JKU header injection.

Ethan Kim
Ethan Kim
CTO
Ownerless API Keys: When 60% of Your Credentials Have No Identifiable Owner (NHI Kill Chain #8)
Apr 20, 2026

Ownerless API Keys: When 60% of Your Credentials Have No Identifiable Owner (NHI Kill Chain #8)

A new CISO ordered a full NHI audit. The result: 3,400 active credentials, 60% with no identifiable owner. Can't revoke them, can't rotate them, can't assign responsibility.

Ben Kim
Ben Kim
Founder & CEO
Credential Sprawl: How One Database Password Spread to 7 Platforms (NHI Kill Chain #6)
Apr 17, 2026

Credential Sprawl: How One Database Password Spread to 7 Platforms (NHI Kill Chain #6)

A PostgreSQL master password drifted across seven platform types — from Secrets Manager to GitHub, Jenkins, Docker Hub, Jira, Confluence, and Slack. Each security tool saw its own silo. None saw the full picture.

Ben Kim
Ben Kim
Founder & CEO
Expired Credentials That Still Work: The Zombie Key Problem (NHI Kill Chain #5)
Apr 14, 2026

Expired Credentials That Still Work: The Zombie Key Problem (NHI Kill Chain #5)

Secret scanning alert: Resolved. Credential status: Active. Deleting a secret from code is not the same as revoking it. Inside the Zombie Key kill chain.

Ben Kim
Ben Kim
Founder & CEO
Over-privileged API Keys: When One Credential Unlocks Too Much (NHI Kill Chain #4)
Apr 11, 2026

Over-privileged API Keys: When One Credential Unlocks Too Much (NHI Kill Chain #4)

A single Stripe API key was copied to 14 locations over three years. When a QA repo went public, the key was exposed — and revoking it meant breaking 14 services simultaneously.

Ben Kim
Ben Kim
Founder & CEO
Unrotated API Keys: Why Years-Old Credentials Still Run Production (NHI Kill Chain #3)
Apr 10, 2026

Unrotated API Keys: Why Years-Old Credentials Still Run Production (NHI Kill Chain #3)

A single AWS key, never rotated for 3 years, spread across 7 systems. When a supply chain attack hit a Terraform CI plugin, the key gave attackers full infrastructure access. Inside the Aged Key kill chain and how to defend against long-lived credentials.

Ben Kim
Ben Kim
Founder & CEO
Shadow Service Accounts: Detecting Undocumented Machine Identities (NHI Kill Chain #2)
Apr 5, 2026

Shadow Service Accounts: Detecting Undocumented Machine Identities (NHI Kill Chain #2)

A single production outage left credentials in six non-code platforms — Slack, Jira, Confluence, Sentry, Datadog, and PagerDuty. Your secret scanner found none of them. Inside the Shadow Key kill chain.

Ben Kim
Ben Kim
Founder & CEO
Orphaned API Keys: The Security Risk of Credentials With No Owner (NHI Kill Chain #1)
Apr 2, 2026

Orphaned API Keys: The Security Risk of Credentials With No Owner (NHI Kill Chain #1)

A departed developer's AWS key stayed active for 92 days. When an infostealer hit their personal laptop, the key was sold on the dark web. Inside the Ghost Key kill chain and how to defend against orphaned credentials.

Ben Kim
Ben Kim
Founder & CEO
When the Security Scanner Became the Weapon — A Cyber Kill Chain Analysis of the Trivy Supply Chain Attack
Mar 25, 2026

When the Security Scanner Became the Weapon — A Cyber Kill Chain Analysis of the Trivy Supply Chain Attack

Aqua Security's Trivy was compromised by TeamPCP, cascading into LiteLLM. A 7-phase Cyber Kill Chain and MITRE ATT&CK analysis of how incomplete credential rotation turned a single breach into a five-ecosystem catastrophe.

Ben Kim
Ben Kim
Founder & CEO
Git Secret Scanning: Complete Guide for 2026
Jan 25, 2026

Git Secret Scanning: Complete Guide for 2026

Complete guide to git secret scanning tools. Compare TruffleHog, GitGuardian, GitHub Advanced Security, and Cremit. Learn implementation strategies with real CI/CD examples

Ben Kim
Ben Kim
Founder & CEO
Stop Secrets Sprawl: Shifting Left for Effective Secret Detection
Apr 14, 2025

Stop Secrets Sprawl: Shifting Left for Effective Secret Detection

Stop Secrets Sprawl: Shifting Left for Effective Secret Detection

Ben Kim
Ben Kim
Founder & CEO
DevSecOps: Why start with Cremit
Mar 18, 2024

DevSecOps: Why start with Cremit

DevSecOps: Why start with Cremit

Ben Kim
Ben Kim
Founder & CEO