News
Explore the latest updates in NHI security, including recent enhancements to our platform, insightful research, and news on managing non-human identity risks
Featured
Stay informed on critical NHI security topics with expert insights, practical guidance, and timely updates from our latest posts.

The 2025 Cybersecurity Landscape: Download the Full Report
2025 cyber threats are here. Get our report on ITDR, NHI security & DevSecOps defense. Download your free copy now!

A Study on Secret Exposure Cases within Vercel Environment Frontend Code: AWS, Stripe, Github Keys Were Exposed
Research on Vercel environments finds critical secrets like AWS/Stripe keys exposed in frontend code. Learn risks, causes, and prevention.

Nx Package Supply Chain Attack: In-Depth Analysis of a Global Security Crisis Starting from GitHub Actions Vulnerability
On August 26, 2025, malicious versions of the popular Nx monorepo tool, downloaded 4 million times per week, were published to NPM, resulting in mass theft of sensitive information from developers worldwide. This incident (GHSA-cxm3-wv7p-598c) demonstrated a sophisticated multi-layered attack system, starting from a GitHub Actions pull_request_target workflow vulnerability, leading to NPM token theft, malicious package distribution, and sophisticated data collection exploiting AI CLI tools.

OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management
Deep dive into OWASP NHI5 Overprivileged NHIs & AI. Learn causes, risks, detection, and mitigation strategies like CIEM, PaC, and JIT access.

Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security
Traditional NHI controls like rotation aren't enough. Discover why proactive, continuous secret detection is essential for securing modern infrastructure.

OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans
Deep dive into OWASP NHI4: Insecure Authentication. Understand the risks of NHIs, key vulnerabilities, and how Zero Trust helps protect your systems.
Say goodbye to endless logs. Get focused intelligence that lets you monitor, manage, and secure your non-human identities—fast.

Blog
Explore practical guides, expert insights, and other valuable resources focused on non-human identity security.

The 2025 Cybersecurity Landscape: Download the Full Report
2025 cyber threats are here. Get our report on ITDR, NHI security & DevSecOps defense. Download your free copy now!

A Study on Secret Exposure Cases within Vercel Environment Frontend Code: AWS, Stripe, Github Keys Were Exposed
Research on Vercel environments finds critical secrets like AWS/Stripe keys exposed in frontend code. Learn risks, causes, and prevention.

Nx Package Supply Chain Attack: In-Depth Analysis of a Global Security Crisis Starting from GitHub Actions Vulnerability
On August 26, 2025, malicious versions of the popular Nx monorepo tool, downloaded 4 million times per week, were published to NPM, resulting in mass theft of sensitive information from developers worldwide. This incident (GHSA-cxm3-wv7p-598c) demonstrated a sophisticated multi-layered attack system, starting from a GitHub Actions pull_request_target workflow vulnerability, leading to NPM token theft, malicious package distribution, and sophisticated data collection exploiting AI CLI tools.

OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management
Deep dive into OWASP NHI5 Overprivileged NHIs & AI. Learn causes, risks, detection, and mitigation strategies like CIEM, PaC, and JIT access.

Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security
Traditional NHI controls like rotation aren't enough. Discover why proactive, continuous secret detection is essential for securing modern infrastructure.

OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans
Deep dive into OWASP NHI4: Insecure Authentication. Understand the risks of NHIs, key vulnerabilities, and how Zero Trust helps protect your systems.
FAQ