
Nx Package Supply Chain Attack: In-Depth Analysis of a Global Security Crisis Starting from GitHub Actions Vulnerability
Nx Package Supply Chain Attack: In-Depth Analysis of a Global Security Crisis Starting from GitHub Actions Vulnerability

Learn from experts, understand everything you need to know about compliance, and find answers to your pressing security questions.

A prompt injection in a GitHub Issue title hijacked Cline's AI triage bot, stole npm tokens, and silently installed a rogue AI agent on 4,000 developer machines. The era of AI-installing-AI supply chain attacks has arrived.



Nx Package Supply Chain Attack: In-Depth Analysis of a Global Security Crisis Starting from GitHub Actions Vulnerability


The 2025 Cybersecurity Landscape: Download the Full Report


A Study on Secret Exposure Cases within Vercel Environment Frontend Code: AWS, Stripe, Github Keys Were Exposed


OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management


Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security


OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans


Securing Your Software Pipeline: The Role of Secret Detection


Navigating the Expanding AI Universe: Deepening Our Understanding of MCP, A2A, and the Imperative of Non-Human Identity Security


Stop Secrets Sprawl: Shifting Left for Effective Secret Detection


Hidden Dangers: Why Detecting Secrets in S3 Buckets is Critical


Rising Data Breach Costs: Secret Detection's Role


Human vs. Non-Human Identity: The Key Differentiators


Wake-Up Call: tj-actions/changed-files Compromised NHIs


Behind the Code: Best Practices for Identifying Hidden Secrets


OWASP NHI1:2025 Improper Offboarding- A Comprehensive Overview


Stop the Sprawl: Introducing Cremit’s AWS S3 Non-Human Identity Detection


Build vs. Buy: Making the Right Choice for Secrets Detection


Bybit Hack Analysis: Strengthening Crypto Exchange Security


OWASP NHI2:2025 Secret Leakage – Understanding and Mitigating the Risks


OWASP NHI3:2025 - Vulnerable Third-Party NHI


6 Essential Practices for Protecting Non-Human Identities


Vigilant Ally: Helping Developers Secure GitHub Secrets


Credential Leakage Risks Hiding in Frontend Code


Cremit Joins AWS SaaS Spotlight Program


Introducing Probe! Cremit's New Detection Engine


Understanding the OWASP Non-Human Identities (NHI) Top 10 Threats


DevSecOps: Why start with Cremit


Customer Interview: Insights from ENlighten


What Is Secret Detection? A Beginner’s Guide


Microsoft Secrets Leak: A Cybersecurity Wake-Up Call


Secret Sprawl and Non-Human Identities: The Growing Security Challenge
