Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hush Security Emerges Stealth to Eliminate Credential Threats With No-Secrets Platform

Posted on September 10, 2025September 10, 2025 By CWS

Hush Safety has emerged from stealth with $11 million seed funding, and a machine entry platform that eliminates secrets and techniques.

The seed funding is led by Battery Ventures and YL Ventures. 

The brand new machine entry platform makes use of just-in-time coverage relatively than secrets and techniques; and the aim is to take away the present reliance on overburdened vaults and secrets and techniques managers to take care of secrets and techniques. The receiving machine decides on the time of contact whether or not to permit entry and requires no incoming machine id key.

Over the previous decade, the necessity for and use of machine IDs has expanded quickly. Software program now sits between totally different clouds, and in on-prem datacenters. Quickly rising use of SaaS options will increase the proliferation, and the arrival of agentic AI is accelerating the issue. 

“Each time a software program interplay happens, it wants a key,” feedback Micha Rave (CEO and co-founder of Hush Safety). “How do you produce that key? How do you cross the important thing to somebody? Who owns the handbook course of? It strikes between totally different groups: the safety workforce, the operations workforce, the event and engineering workforce – every of them must be a part of that course of.”

A lot of that is at present constructed round maintaining the secrets and techniques safely saved in a safe vault, itself a single level of worth. Hush calls the vault system a legacy answer, maybe with some justification since Gartner has predicted that 40% of organizations will undertake an method not depending on secrets and techniques by 2027.

The Hush answer is to outline the function of the key key as a coverage throughout the code of the software program being accessed. As a substitute of demanding a key (that would have been stolen and is barely a pseudo id that doesn’t genuinely show something) the coverage defines which machine, or which group of machines, will likely be granted entry to any service.

This coverage could be as tight or as unfastened as necessitated by the extent of danger tolerance of the service being accessed. Entry may very well be restricted to a person laptop, maybe based mostly on its serial quantity, or a variety of different attributes that solely belong to 1 laptop or a gaggle of identified and permitted computer systems. Commercial. Scroll to proceed studying.

It may be conditional: “This machine can entry this service solely between 8:00 am and 4:00 pm,” explains Rave; “That machine can entry that service provided that one other service, like Wiz [now part of Google Cloud, but under DoJ antitrust review] or like Palo Alto, has already advised me that the machine is totally protected. If it’s not utterly protected, don’t let it entry the service.”

Hush might help with the transition to this no-secrets method by mapping all the present interactions and changing them right into a baseline of insurance policies. Continuation then turns into largely a upkeep train, positive tuning present insurance policies and including new insurance policies for brand spanking new interactions.

Whereas the brand new system does require handbook effort in growing and implementing the insurance policies, the Hush platform is based on perception the labor concerned is lower than that required to implement and handle separate keys – and much safer. Credential-based threats, for instance, grow to be a factor of the previous as a result of there aren’t any credentials. “We’ve eradicated the necessity for credentials completely.,” says Rave.

“Chasing secrets and techniques or watching dashboards doesn’t cease assaults,” he continues. “Vaults have been constructed for an period the place environments modified slowly and AI was not a part of the equation. That period is over. AI brokers, ephemeral workloads, and automation have modified the sport, and the vault mannequin can’t sustain.”

Hush Safety (based mostly in Tel Aviv, Israel) was based in 2024 by Micha Rave (CEO), Chen Nisnkorn (CCO), Shmulik Ladkani (CTO), and Alon Horowitz (VP R&D). The funding will likely be used to increase engineering and speed up world GTM efforts.

Associated: Enterprise Secrets and techniques Uncovered by CyberArk Conjur Vulnerabilities

Associated: Palo Alto Networks to Purchase CyberArk for $25 Billion

Associated: GitHub Workflows Assault Impacts Tons of of Repos, 1000’s of Secrets and techniques

Associated: 39 Million Secrets and techniques Leaked on GitHub in 2024

Security Week News Tags:Credential, Eliminate, Emerges, Hush, NoSecrets, Platform, Security, Stealth, Threats

Post navigation

Previous Post: Apple iPhone Air and iPhone 17 Feature A19 Chips With Spyware-Resistant Memory Safety
Next Post: Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs

Related Posts

Chrome 137 Update Patches High-Severity Vulnerabilities Security Week News
Telecom Giant Orange Hit by Cyberattack Security Week News
Surveillance Firm Bypasses SS7 Protections to Retrieve User Location Security Week News
LevelBlue to Acquire Trustwave to Create Major MSSP Security Week News
Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data Security Week News
PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used
  • Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack
  • Accessible AI-Powered Cybersecurity Platform for SME Security
  • New Phishing Attack Mimics Google AppSheet to Steal Login Credentials
  • CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used
  • Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack
  • Accessible AI-Powered Cybersecurity Platform for SME Security
  • New Phishing Attack Mimics Google AppSheet to Steal Login Credentials
  • CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News