Platform
Resources
Blog
Company
About
Contact
Log In
Get a Demo
Breaches
Breaches
Vaults Are Done. This Train Has Left the Station.
Managing secrets is broken — risky, complex, and outdated. Hush Security offers a new approach: secretless, policy-driven access for every machine and AI agent, built for scale and simplicity.
Read More
Micha Rave
CEO and Co-Founder
Aug 17, 2025
View all
Research
Identity Security
Breaches
Breaches
Shai-Hulud 2.0: Why Attackers Hunt Machine Identities
Shai-Hulud proved a stark 2025 reality: attackers now target non-human identities, CI/CD tokens, package-publish keys, cloud API keys—because those credentials grant direct production control. The defense must shift from secret-hunting to full NHI lifecycle management and runtime visibility/enforcement.
Yuval Lazar
Head of Security Research
Nov 25, 2025
Breaches
Vaults Are Done. This Train Has Left the Station.
Managing secrets is broken — risky, complex, and outdated. Hush Security offers a new approach: secretless, policy-driven access for every machine and AI agent, built for scale and simplicity.
Micha Rave
CEO and Co-Founder
Aug 17, 2025
Still Using Secrets?
Let's Fix That.
Get a Demo