Tag: Breaches

The response to the Canvas breach revealed how much modern institutions still depend on long-lived credentials, shared trust layers, and persistent access between systems.
Non-human identities outnumber human users 144 to 1, yet most security programs overlook them. The OWASP NHI Top 10 maps the risks.
The 2025 Verizon DBIR confirmed what security teams already suspect: credential theft is outpacing the defenses most organizations have in place.
Anthropic’s disclosure of an AI-driven espionage campaign it halted is best understood as a faster, more persistent version of patterns the industry has seen before. What distinguishes this incident is the continuity of activity an autonomous system can sustain once it is given the ability to interpret its surroundings and act on that understanding.
The Trivy incident exposed a credential architecture failure, not just a supply chain one. Here’s the case for workload identity and access.
Details shared by the attacker suggest the intrusion expanded beyond the initial application through permissions that allowed access to dozens of internal credentials.
A ServiceNow impersonation flaw illustrates how agentic systems turn weak identity assumptions into durable access paths across enterprise environments.
A project to improve test visibility meant using Aembit the same way customers do, in a real deployment environment where software runs unattended and requires trusted access to external services.
The exposure demonstrates how ordinary errors can reveal internal credentials and how stronger limits on scope and lifespan can contain the impact.
The incident shows how repositories double as inadvertent credential stores, extending risk from vendors into customer environments.