🚀 Machine Identity Management: A Top Cybersecurity Trend for 2025 We’re thrilled to see machine identity (NHI) management highlighted as a top trend in Gartner’s new report, Top Trends in Cybersecurity for 2025. As automation, AI, and cloud adoption continue to rise, securing machine identities has become a critical challenge — and opportunity — for organizations aiming to strengthen their cybersecurity posture. 💡 Key takeaways from the report: • Growing risk: 85% of identity-related breaches involve machine identities like service or automation accounts. • IAM responsibilities: Only 44% of machine identities are managed by core IAM teams, emphasizing the need for cross-functional collaboration. • Strategic focus: Organizations must centralize governance while enabling decentralized execution for effective management. Read the full research paper by Gartner: https://lnkd.in/d9UarY9T At Astrix Security, we’re committed to helping businesses protect and manage the lifecycle of machine identities (NHIs) — to mitigate threats and continuously reduce attack surfaces. If machine identity management and security aren’t already part of your strategy, it’s time to prioritize it. 🔗 Learn more about how we can help: https://lnkd.in/dPPRMrJk Felix Gaehtgens, Oscar Isaka Junior Zachary Smith #nonhumanidentities #NHI #NHISecurity #Cybersecurity #MachineIdentityManagement #IAM #AstrixSecurity
About us
With 20,000 non-human identities for every 1,000 employees, NHIs are the biggest blindspot in IAM security programs. Recent high-profile attacks like Okta, Cloudflare, and MS Midnight Blizzard prove that service accounts, API keys, OAuth apps, SSH keys, and other NHIs hold privileged, ungoverned access to enterprise environments and should be protected as vigorously as human identities. Astrix Security is the first platform purposely built to control and manage the lifecycle of non-human identities, helping enterprises like NetApp, Figma and Agoda control their NHI attack surface and prevent supply chain attacks. The platform provides continuous discovery, posture management, threat detection, and automatic remediation for non-human identities across business and engineering environments. An RSA Innovation Sandbox finalist and 2023 Gartner Cool Vendor for Identity-first security.
- Website
-
https://www.astrix.security/
External link for Astrix Security
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- New York
- Type
- Privately Held
- Founded
- 2021
Products
Locations
-
Primary
New York, US
-
Manhattan Ave
New York, NY, US
Employees at Astrix Security
-
Dimitri Sirota
BigID - Know Your Data | Control Your Data
-
Rodney Toy
Advisor; GTM /Sales / Revenue Operations Executive; Contemporary Artist; Executive Board Member and Treasurer at Art in Action
-
Shira Kaplan
Cyber-Security Entrepreneur & Investor | Board Advisor | World Economic Forum Young Global Leader (2017) | Bilanz 100 Digital Shapers "Hall of Fame"
-
Brian Kennedy
Updates
-
A recent OAuth phishing attack led to a potential compromise of over 400,000 users. ⚠️ Our security researcher Tomer Yahalom shares all the details 👇
From a single OAuth Phishing victim to a potential compromise of over 400,000 users 🚨 Have you come across Google’s new “Privacy Policy Extension” OAuth app? Hopefully not, as it was recently exploited in a phishing attack targeting CyberHaven - a cybersecurity company specializing in insider threat protection. Here’s what happened: A CyberHaven employee received a phishing email that led him to believe that without further actions, the CyberHaven Chrome extension will be taken off the Chrome Web Store. He then clicked on a link embedded in the mail, which led him to unknowingly authorize a malicious third-party Google OAuth Application and grant it access to his Chrome Web Store extensions. This allowed the threat actor to push a modified, malicious version of the CyberHaven Chrome extension. The extension collected the user's Facebook data - including access tokens and user IDs - and transmitted it to a command-and-control server. It is important to emphasize that the employee had all the standard "human identity" security features - MFA and Google Advanced protection - enabled, and neither kicked in to stop this attack. This is just one of many attacks from recent years that demonstrate how traditional security features are not enough to stop Non-Human Identity attacks. An NHI security tool could have at least alerted CyberHaven that they have a new OAuth App connected to their Google Workspace, giving them a chance to react to this threat before it caused significant impact. But it doesn't just end here: Following CyberHaven’s disclosure of the breach, researchers identified over 20 additional compromised Chrome extensions linked to the same indicators of compromise, all funneling user data to the malicious C&C - revealing this to be a major campaign. Some Chrome extensions were compromised over a year ago without detection. If the other extensions were compromised using the same method - OAuth phishing attack - this means that this entire campaign, which affected over 2,000,000 users, could have been averted if the developers had proper NHI defense mechanisms in place. OAuth phishing attacks are not new and have been present since at least 2019, making headlines in multiple cases. Notable examples include Microsoft warning users about malicious 365 OAuth apps in 2022 and earlier this year when GitHub developers were targeted by the malicious Gitloker OAuth App. Sources: https://lnkd.in/ds-kbxXx https://lnkd.in/dW463jU6 https://lnkd.in/dN9DyT9u
-
Happy holidays and Merry Christmas from the Astrix team! 🎅🕎 To our amazing customers, partners, team members, and the entire cybersecurity community - may your holiday season be filled with joyful family moments, delicious food, and memories that last a lifetime. ❄️ (P.S. We promise no Santa-themed #NHI jokes this year… 🤖)
-
Top-10 NHI Security Predictions for 2025 🔭 A moment before the holidays and 2025, our experts put together their top 10 predictions for what's to come in the realm of #NHI Security, and it's definitely a great holiday read! From the lackluster adoption of passwordless authentication to compliance drivers and AI's impact -- these predictions are based on current trends and our experts' experience in this booming market. 💥 Read the full article here: https://lnkd.in/dZmUvkDe
-
A very commonly used rust package with 10,000 starts on GitHub was breached, leading to an upload of a malicious package version. Our Research Team Lead, Tal Skverer, shares his insights on the breach and its impact 👇
Today, rspack, a rust-based tool that helps speed up the process of preparing code for websites and apps, has announced a compromise to two of their packages - rspack/core and rspack/cli. The maintainers detected that an attacker has released a new version of the packages, 1.1.17 using a compromised NPM token, containing malicious code. As a response to the breach, the package maintainers revoked the token, removed the malicious package and committed to follow stricter token management protocols. Tokens have become the main target for attackers: the simplicity of use immediately granted access to anyone holding the token, and the fact that they are so often accidentally exposed and have excessive permissions makes it a no-brainer for threat actors to search for. Hopefully, the fast response time of the maintainers in this case restricted the blast radius of this attack, but we, as a community, cannot rely on this and must embrace better security around handling tokens.
-
Revolution Medicines is transforming the fight against pancreatic cancer, and we’re proud to play a part in their journey. Alec Lessard, information security senior manager at RevMed, shares how Astrix helps them tackle the challenges of non-human identity security: 🔍 Token attacks in the wild: With threats like Midnight Blizzard proving devastating due to limited visibility, RevMed turned to Astrix for a solution. ⚙️ Centralized key management: “With Astrix, that worry goes away,” Alec shared. By centralizing key management, RevMed gained a full view of which keys are communicating with what, and easily cleaned up over-privileges. ✅ Confidence in security: Astrix delivered ease of mind and a proactive monitoring solution, allowing RevMed to focus on their important mission. Check out Alec’s full testimonial 👇
-
Live by the sword, die by the sword. Our talented researcher Yoav Raman tells the story of a recent exploit that targeted actual hackers, leading to the theft of 400,000 WordPress credentials. Read his full insights 👇
Hackers hacked by hackers - leading to 400K stolen WordPress credentials In a recent attack targeting offensive security professionals, a threat actor known as MUT-1244 lured unsuspecting black and white hackers into downloading and running trojanized exploits for CVEs and other hacking tools in GitHub repos. As someone who uses these kinds of tools on a semi-regular basis (for educational purposes only 🙂) and received multiple antivirus alerts over some of those, this does not come as a surprise. This is only one of a few vectors used by MUT-1244 to deliver the same second-stage payload that exfiltrates AWS credentials, SSH private keys, and the terminal’s history. In addition, the payload backdoors the infected system to provide persistence and enable further attacks against it. This is where it gets interesting. One of the repositories, by the name YAWPP, contained a tool pretending to be a WordPress credential checker, stole those credentials (in addition to running the generic second-stage payload), leading to nearly 400,000 WordPress credentials being stolen. This campaign shows that no one, not even experienced security professionals, is invincible to mistakes. Credentials will always be prone to getting leaked and ending up in the hands of an attacker. Luckily, it is still possible to maintain relative security when using them, even when they do get leaked. This can be done by restricting their access and monitoring the identities behind those credentials for breaches and abuse. As a personal note, I urge offensive security practitioners to always read the exploits they are about to run, especially when they come from untrusted sources, both to prevent these kinds of attacks against them and to understand the attack they are performing (as part of a pentest or red-team operation) on a deeper level. https://lnkd.in/erwbTnSZ
Getting a taste of your own medicine: Threat actor MUT-1244 targets offensive actors, leaking hundreds of thousands of credentials | Datadog Security Labs
securitylabs.datadoghq.com
-
How are we going to use our new funding to make NHI security even better? Glad you asked. 🤓 Idan Gour, our CTO and Co-founder, shares how Astrix plans to use the recent Series B funding to redefine identity security in the AI era. ״The growing connectivity of AI agents within enterprise environments is accelerating the proliferation of NHIs. While this makes our mission more critical and complex than ever, it also presents a golden opportunity to ensure NHI security evolves to meet tomorrow’s challenges.״ Read Idan's article: https://lnkd.in/eFu3UxzZ
-
Astrix CTO Idan Gour on the NYSE Floor Talk 🎙️ Don’t miss Idan talking with Judy Khan Shaw about our $45M Series B, what sets Astrix apart in Identity Security, and our vision for 2025. Check it out 👇 https://lnkd.in/duG4kPrS