Skip to main content
NEW: RSAC 2026 NHI Field Report. How Non-Human Identity became cybersecurity's central axis
Back to Blog
Tag

NHI Security

33 posts
NHI Kill Chain: 8 Ways Your Credentials Are Already Compromised (And the One Fix That Addresses All of Them)
Apr 30, 2026

NHI Kill Chain: 8 Ways Your Credentials Are Already Compromised (And the One Fix That Addresses All of Them)

Eight types of dangerous NHI credentials. One framework to find, classify, and eliminate them all. The complete NHI Kill Chain series summary with Cyber Kill Chain and MITRE ATT&CK mapping.

Ben Kim
Ben Kim
Founder & CEO
Bitwarden CLI Hack (April 2026): How a 90-Minute npm Window Stole AWS, GCP, GitHub Tokens
Apr 25, 2026

Bitwarden CLI Hack (April 2026): How a 90-Minute npm Window Stole AWS, GCP, GitHub Tokens

On April 22, 2026, the official @bitwarden/cli@2026.4.0 npm package was malicious for ~90 minutes. A self-propagating worm exfiltrated AWS, Azure, GCP, GitHub, npm, SSH, and AI tooling credentials from CI runners. Vaults stayed safe. CI tokens did not. Timeline, NHI kill-chain mapping, and a 10-minute checklist to know whether you were affected.

Ben Kim
Ben Kim
Founder & CEO
Vercel's April 2026 Incident Is a Textbook NHI Problem: What to Rotate and Why
Apr 20, 2026

Vercel's April 2026 Incident Is a Textbook NHI Problem: What to Rotate and Why

Vercel confirmed an unauthorized-access incident on April 19, 2026 that started in a third-party AI tool, pivoted through Google Workspace, and reached environment variables in a subset of customer projects. The exposure surface is every env var that was not marked sensitive. Here is what is confirmed, what is noise, and what to rotate first.

Ben Kim
Ben Kim
Founder & CEO
Ownerless API Keys: When 60% of Your Credentials Have No Identifiable Owner (NHI Kill Chain #8)
Apr 20, 2026

Ownerless API Keys: When 60% of Your Credentials Have No Identifiable Owner (NHI Kill Chain #8)

A new CISO ordered a full NHI audit. The result: 3,400 active credentials, 60% with no identifiable owner. Can't revoke them, can't rotate them, can't assign responsibility.

Ben Kim
Ben Kim
Founder & CEO
Credential Sprawl: How One Database Password Spread to 7 Platforms (NHI Kill Chain #6)
Apr 17, 2026

Credential Sprawl: How One Database Password Spread to 7 Platforms (NHI Kill Chain #6)

A PostgreSQL master password drifted across seven platform types — from Secrets Manager to GitHub, Jenkins, Docker Hub, Jira, Confluence, and Slack. Each security tool saw its own silo. None saw the full picture.

Ben Kim
Ben Kim
Founder & CEO
The "Out of Scope" Loophole: Why Bug Bounties Look Away From Credential Exposure
Apr 15, 2026

The "Out of Scope" Loophole: Why Bug Bounties Look Away From Credential Exposure

An organization's core credentials sat in public repositories for years. The security industry's answer: "Out of scope."

Ben Kim
Ben Kim
Founder & CEO
Expired Credentials That Still Work: The Zombie Key Problem (NHI Kill Chain #5)
Apr 14, 2026

Expired Credentials That Still Work: The Zombie Key Problem (NHI Kill Chain #5)

Secret scanning alert: Resolved. Credential status: Active. Deleting a secret from code is not the same as revoking it. Inside the Zombie Key kill chain.

Ben Kim
Ben Kim
Founder & CEO
Over-privileged API Keys: When One Credential Unlocks Too Much (NHI Kill Chain #4)
Apr 11, 2026

Over-privileged API Keys: When One Credential Unlocks Too Much (NHI Kill Chain #4)

A single Stripe API key was copied to 14 locations over three years. When a QA repo went public, the key was exposed — and revoking it meant breaking 14 services simultaneously.

Ben Kim
Ben Kim
Founder & CEO
Unrotated API Keys: Why Years-Old Credentials Still Run Production (NHI Kill Chain #3)
Apr 10, 2026

Unrotated API Keys: Why Years-Old Credentials Still Run Production (NHI Kill Chain #3)

A single AWS key, never rotated for 3 years, spread across 7 systems. When a supply chain attack hit a Terraform CI plugin, the key gave attackers full infrastructure access. Inside the Aged Key kill chain and how to defend against long-lived credentials.

Ben Kim
Ben Kim
Founder & CEO
Shadow Service Accounts: Detecting Undocumented Machine Identities (NHI Kill Chain #2)
Apr 5, 2026

Shadow Service Accounts: Detecting Undocumented Machine Identities (NHI Kill Chain #2)

A single production outage left credentials in six non-code platforms — Slack, Jira, Confluence, Sentry, Datadog, and PagerDuty. Your secret scanner found none of them. Inside the Shadow Key kill chain.

Ben Kim
Ben Kim
Founder & CEO
Orphaned API Keys: The Security Risk of Credentials With No Owner (NHI Kill Chain #1)
Apr 2, 2026

Orphaned API Keys: The Security Risk of Credentials With No Owner (NHI Kill Chain #1)

A departed developer's AWS key stayed active for 92 days. When an infostealer hit their personal laptop, the key was sold on the dark web. Inside the Ghost Key kill chain and how to defend against orphaned credentials.

Ben Kim
Ben Kim
Founder & CEO
When the Security Scanner Became the Weapon — A Cyber Kill Chain Analysis of the Trivy Supply Chain Attack
Mar 25, 2026

When the Security Scanner Became the Weapon — A Cyber Kill Chain Analysis of the Trivy Supply Chain Attack

Aqua Security's Trivy was compromised by TeamPCP, cascading into LiteLLM. A 7-phase Cyber Kill Chain and MITRE ATT&CK analysis of how incomplete credential rotation turned a single breach into a five-ecosystem catastrophe.

Ben Kim
Ben Kim
Founder & CEO
Publicly Exposed API Keys: What Happens When Credentials Reach Open Repos (NHI Kill Chain #7)
Mar 17, 2026

Publicly Exposed API Keys: What Happens When Credentials Reach Open Repos (NHI Kill Chain #7)

A .env file pushed to a public GitHub repo is found by attacker bots in 4 minutes. We map the full kill chain — from credential exposure to infrastructure compromise and show how to detect and respond before the damage is done.

Ben Kim
Ben Kim
Founder & CEO
How a Single GitHub Issue Title Compromised 4,000 Developer Machines
Mar 7, 2026

How a Single GitHub Issue Title Compromised 4,000 Developer Machines

A prompt injection in a GitHub Issue title hijacked Cline's AI triage bot, stole npm tokens, and silently installed a rogue AI agent on 4,000 developer machines. The era of AI-installing-AI supply chain attacks has arrived.

Ben Kim
Ben Kim
Founder & CEO
The 2025 Cybersecurity Landscape: Download the Full Report
May 29, 2025

The 2025 Cybersecurity Landscape: Download the Full Report

The 2025 Cybersecurity Landscape: Download the Full Report

Ben Kim
Ben Kim
Founder & CEO
OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management
Apr 25, 2025

OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management

OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management

Ben Kim
Ben Kim
Founder & CEO
Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security
Apr 23, 2025

Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security

Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security

Ben Kim
Ben Kim
Founder & CEO
OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans
Apr 22, 2025

OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans

OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans

Ben Kim
Ben Kim
Founder & CEO
MCP and A2A: Why Non-Human Identity Security Matters in the AI Era
Apr 16, 2025

MCP and A2A: Why Non-Human Identity Security Matters in the AI Era

Model Context Protocol (MCP) and Agent-to-Agent (A2A) communication are redrawing the NHI security boundary. What changes when AI agents become first-class identities in your infrastructure.

Ben Kim
Ben Kim
Founder & CEO
Human vs. Non-Human Identity: The Key Differentiators
Apr 1, 2025

Human vs. Non-Human Identity: The Key Differentiators

Human vs. Non-Human Identity: The Key Differentiators

Ben Kim
Ben Kim
Founder & CEO
Wake-Up Call: tj-actions/changed-files Compromised NHIs
Mar 25, 2025

Wake-Up Call: tj-actions/changed-files Compromised NHIs

Wake-Up Call: tj-actions/changed-files Compromised NHIs

Ben Kim
Ben Kim
Founder & CEO
Behind the Code: Best Practices for Identifying Hidden Secrets
Mar 18, 2025

Behind the Code: Best Practices for Identifying Hidden Secrets

Behind the Code: Best Practices for Identifying Hidden Secrets

Ben Kim
Ben Kim
Founder & CEO
OWASP NHI1:2025 Improper Offboarding- A Comprehensive Overview
Mar 3, 2025

OWASP NHI1:2025 Improper Offboarding- A Comprehensive Overview

OWASP NHI1:2025 Improper Offboarding- A Comprehensive Overview

Ben Kim
Ben Kim
Founder & CEO
Stop the Sprawl: Introducing Cremit’s AWS S3 Non-Human Identity Detection
Feb 25, 2025

Stop the Sprawl: Introducing Cremit’s AWS S3 Non-Human Identity Detection

Stop the Sprawl: Introducing Cremit’s AWS S3 Non-Human Identity Detection

Ben Kim
Ben Kim
Founder & CEO
Build vs. Buy: Making the Right Choice for Secrets Detection
Feb 25, 2025

Build vs. Buy: Making the Right Choice for Secrets Detection

Build vs. Buy: Making the Right Choice for Secrets Detection

Ben Kim
Ben Kim
Founder & CEO
Bybit Hack Analysis: Strengthening Crypto Exchange Security
Feb 18, 2025

Bybit Hack Analysis: Strengthening Crypto Exchange Security

Bybit Hack Analysis: Strengthening Crypto Exchange Security

Ben Kim
Ben Kim
Founder & CEO
OWASP NHI2:2025 Secret Leakage – Understanding and Mitigating the Risks
Feb 18, 2025

OWASP NHI2:2025 Secret Leakage – Understanding and Mitigating the Risks

OWASP NHI2:2025 Secret Leakage – Understanding and Mitigating the Risks

Ben Kim
Ben Kim
Founder & CEO
OWASP NHI3:2025 - Vulnerable Third-Party NHI
Feb 4, 2025

OWASP NHI3:2025 - Vulnerable Third-Party NHI

OWASP NHI3:2025 - Vulnerable Third-Party NHI

Ben Kim
Ben Kim
Founder & CEO
6 Essential Practices for Protecting Non-Human Identities
Dec 5, 2024

6 Essential Practices for Protecting Non-Human Identities

6 Essential Practices for Protecting Non-Human Identities

Ben Kim
Ben Kim
Founder & CEO
Introducing Probe! Cremit's New Detection Engine
Aug 3, 2024

Introducing Probe! Cremit's New Detection Engine

Introducing Probe! Cremit's New Detection Engine

Ben Kim
Ben Kim
Founder & CEO
OWASP NHI Top 10 Explained: 10 Machine-Credential Risks Mapped
Apr 9, 2024

OWASP NHI Top 10 Explained: 10 Machine-Credential Risks Mapped

OWASP NHI Top 10 names the machine-credential risks most teams still do not track. Here is what each threat means, and how each maps to real controls you can deploy.

Ben Kim
Ben Kim
Founder & CEO
Customer Interview: Insights from ENlighten
Mar 4, 2024

Customer Interview: Insights from ENlighten

Customer Interview: Insights from ENlighten

Ben Kim
Ben Kim
Founder & CEO
Secret Sprawl and Non-Human Identities: The Growing Security Challenge
Oct 22, 2023

Secret Sprawl and Non-Human Identities: The Growing Security Challenge

Secret Sprawl and Non-Human Identities: The Growing Security Challenge

Ben Kim
Ben Kim
Founder & CEO