• View All
  • Access Management
  • Breaches
  • Identity Security
  • Research
Identity Security

Build Your Security for Assume Breach, Not for Good Hygiene

In the first half of 2024 alone, the cybersecurity landscape was rocked by high-profile incidents, including the Snowflake data breach and major compromises at Microsoft, that shared a common, devastating thread: stolen credentials and compromised secrets. These weren’t sophisticated “zero-day” exploits of technical flaws; they were attackers simply “logging in” using valid, but stolen, identities […]

Adi Chemoul VP Marketing
Jan 19, 2026

What Happens When You Add Identity to API Keys

When applications need to talk to each other, they face a fundamental challenge: how does one system prove it’s legitimate when accessing another? For decades, we’ve relied on secrets - passwords, keys, and tokens - to solve this problem. But as our infrastructure has grown more complex and distributed, these approaches have shown their limitations. […]

Shmulik Ladkani CTO and Co-Founder
Dec 24, 2025
Breaches

Shai-Hulud 2.0: Why Attackers Hunt Machine Identities

Shai-Hulud Proved It: Attackers Hunt NHIs First, Because That’s Where the Power is Shai-Hulud wasn’t loud for the sake of noise, it was a powerful, well-structured attack that understood the modern software ecosystem better than many defenders do. And it validated the clearest trend in 2025 security: attackers prioritize non-human identities (NHIs) over everything else. Shai-Hulud’s […]

Yuval Lazar Head of Security Research
Dec 3, 2025
Identity Security

Why Storm the Castle When You Already Hold the Keys to the Kingdom?

Attackers aren’t breaching platforms — they’re abusing trusted tokens and integrations. This post explains the NHI attack blueprint and how to harden, rotate, and govern machine identities.

Yuval Lazar Head of Security Research
Nov 24, 2025
Research

Unused Secrets: The loaded guns in your infrastructure

Most workloads are hoarding "loaded guns" in their infrastructure. Our analysis shows 43.74% of secrets are unused live credentials that expand your attack surface and drain resources. Vaults aren't the solution; eliminating secrets is. Discover the alternative: secretless access.

Yuval Lazar Head of Security Research
Oct 30, 2025

Why Runtime Insight Is the Missing Piece in Certificate Management

Machine identities are central to security, but certificate sprawl creates hidden risk. Move beyond static inventory to real-time visibility, control, and automated remediation for your machine identity landscape.

Shmulik Ladkani CTO and Co-Founder
Oct 20, 2025
Breaches

Vaults Are Done. This Train Has Left the Station.

Managing secrets is broken — risky, complex, and outdated. Hush Security offers a new approach: secretless, policy-driven access for every machine and AI agent, built for scale and simplicity.

Micha Rave CEO and Co-Founder
Aug 17, 2025

Still Using Secrets?
Let's Fix That.

Get a Demo