breach analysis

5 Non-Human Identity Breaches That Workload IAM Could Have Prevented
5 min readEach breach exploited a gap in how workloads authenticate and access resources. The post 5 Non-Human Identity Breaches That Workload IAM Could Have Prevented appeared first on Aembit ...

GitHub Action Supply Chain Breach Exposes Non-Human Identity Risks in CI/CD
4 min readLong-lived credentials and secrets fueled the attack. The post GitHub Action Supply Chain Breach Exposes Non-Human Identity Risks in CI/CD appeared first on Aembit ...

BeyondTrust Breach Exposes API Key Abuse Risks
3 min readWhen a single API key compromise spiraled into a broader attack, it exposed how overlooked non-human identities can become gateways for escalating threats. The post BeyondTrust Breach Exposes API Key ...

Bigger Organizations Have Multiple Attack Surfaces
Nowadays, protecting within the organization is table stakes, and we have to go beyond the four walls, we have to go and make sure that not only do we protect our organization, ...

The Perils of Overestimating the Security of Your APIs
In 2019, I hacked 30 bank mobile apps and APIs in coordination with domestic and international financial services and FinTech companies. In 2020-2021, I hacked 30 mobile health (mHealth) apps and FHIR ...

A Deep Dive On The Most Critical API Vulnerability — BOLA (Broken Object Level Authorization)
In this article, I dig into the details about Broken Object Level Authorization (BOLA) — the most common and most severe API vulnerability today according to the OWASP API Security Project. Insecure ...