Skip to main content
NEW: RSAC 2026 NHI Field Report. How Non-Human Identity became cybersecurity's central axis
Back to Blog
Category

Security Incidents

Analysis of security breaches and cyber attacks

10 posts
Bitwarden CLI Hack (April 2026): How a 90-Minute npm Window Stole AWS, GCP, GitHub Tokens
Apr 25, 2026

Bitwarden CLI Hack (April 2026): How a 90-Minute npm Window Stole AWS, GCP, GitHub Tokens

On April 22, 2026, the official @bitwarden/cli@2026.4.0 npm package was malicious for ~90 minutes. A self-propagating worm exfiltrated AWS, Azure, GCP, GitHub, npm, SSH, and AI tooling credentials from CI runners. Vaults stayed safe. CI tokens did not. Timeline, NHI kill-chain mapping, and a 10-minute checklist to know whether you were affected.

Ben Kim
Ben Kim
Founder & CEO
Vercel's April 2026 Incident Is a Textbook NHI Problem: What to Rotate and Why
Apr 20, 2026

Vercel's April 2026 Incident Is a Textbook NHI Problem: What to Rotate and Why

Vercel confirmed an unauthorized-access incident on April 19, 2026 that started in a third-party AI tool, pivoted through Google Workspace, and reached environment variables in a subset of customer projects. The exposure surface is every env var that was not marked sensitive. Here is what is confirmed, what is noise, and what to rotate first.

Ben Kim
Ben Kim
Founder & CEO
The "Out of Scope" Loophole: Why Bug Bounties Look Away From Credential Exposure
Apr 15, 2026

The "Out of Scope" Loophole: Why Bug Bounties Look Away From Credential Exposure

An organization's core credentials sat in public repositories for years. The security industry's answer: "Out of scope."

Ben Kim
Ben Kim
Founder & CEO
When the Security Scanner Became the Weapon — A Cyber Kill Chain Analysis of the Trivy Supply Chain Attack
Mar 25, 2026

When the Security Scanner Became the Weapon — A Cyber Kill Chain Analysis of the Trivy Supply Chain Attack

Aqua Security's Trivy was compromised by TeamPCP, cascading into LiteLLM. A 7-phase Cyber Kill Chain and MITRE ATT&CK analysis of how incomplete credential rotation turned a single breach into a five-ecosystem catastrophe.

Ben Kim
Ben Kim
Founder & CEO
How a Single GitHub Issue Title Compromised 4,000 Developer Machines
Mar 7, 2026

How a Single GitHub Issue Title Compromised 4,000 Developer Machines

A prompt injection in a GitHub Issue title hijacked Cline's AI triage bot, stole npm tokens, and silently installed a rogue AI agent on 4,000 developer machines. The era of AI-installing-AI supply chain attacks has arrived.

Ben Kim
Ben Kim
Founder & CEO
API Keys Traded on the Dark Web: Hackers' New Target
Dec 26, 2025

API Keys Traded on the Dark Web: Hackers' New Target

API Keys Traded on the Dark Web: Hackers's New Target

Ben Kim
Ben Kim
Founder & CEO
Nx Package Supply Chain Attack: How a GitHub Actions Vulnerability Caused a Global Crisis
Aug 28, 2025

Nx Package Supply Chain Attack: How a GitHub Actions Vulnerability Caused a Global Crisis

Attackers exploited a GitHub Actions vulnerability to compromise the Nx package. Analysis of the attack chain, who was affected, and how to detect similar threats.

Ben Kim
Ben Kim
Founder & CEO
Rising Data Breach Costs: Secret Detection's Role
Apr 4, 2025

Rising Data Breach Costs: Secret Detection's Role

Rising Data Breach Costs: Secret Detection's Role

Ben Kim
Ben Kim
Founder & CEO
Bybit Hack Analysis: Strengthening Crypto Exchange Security
Feb 18, 2025

Bybit Hack Analysis: Strengthening Crypto Exchange Security

Bybit Hack Analysis: Strengthening Crypto Exchange Security

Ben Kim
Ben Kim
Founder & CEO
Microsoft Secrets Leak: A Cybersecurity Wake-Up Call
Oct 23, 2023

Microsoft Secrets Leak: A Cybersecurity Wake-Up Call

Microsoft Secrets Leak: A Cybersecurity Wake-Up Call

Ben Kim
Ben Kim
Founder & CEO