Meet Aembit IAM for Agentic AI. See what’s possible →

Tag: Breaches

A ServiceNow impersonation flaw illustrates how agentic systems turn weak identity assumptions into durable access paths across enterprise environments.
A project to improve test visibility meant using Aembit the same way customers do, in a real deployment environment where software runs unattended and requires trusted access to external services.
The exposure demonstrates how ordinary errors can reveal internal credentials and how stronger limits on scope and lifespan can contain the impact.
The incident demonstrates how autonomous behavior reshapes intrusion patterns when identity is not clearly assigned or enforced.
The incident shows how repositories double as inadvertent credential stores, extending risk from vendors into customer environments.
This malicious campaign demonstrates how long-lived token theft can become the first step in a much broader breach.
We deep dive into the first-ever NHI threat list – exploring each risk, real-world breaches that prove the threat is real, and how to defend against them.
When a single API key compromise spiraled into a broader attack, it exposed how overlooked non-human identities can become gateways for escalating threats.
The identity layer’s most insidious threat is now setting its sights on a different group of targets. Here’s how to be ready.