Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hush Security Emerges Stealth to Eliminate Credential Threats With No-Secrets Platform

Posted on September 10, 2025September 10, 2025 By CWS

Hush Safety has emerged from stealth with $11 million seed funding, and a machine entry platform that eliminates secrets and techniques.

The seed funding is led by Battery Ventures and YL Ventures. 

The brand new machine entry platform makes use of just-in-time coverage relatively than secrets and techniques; and the aim is to take away the present reliance on overburdened vaults and secrets and techniques managers to take care of secrets and techniques. The receiving machine decides on the time of contact whether or not to permit entry and requires no incoming machine id key.

Over the previous decade, the necessity for and use of machine IDs has expanded quickly. Software program now sits between totally different clouds, and in on-prem datacenters. Quickly rising use of SaaS options will increase the proliferation, and the arrival of agentic AI is accelerating the issue. 

“Each time a software program interplay happens, it wants a key,” feedback Micha Rave (CEO and co-founder of Hush Safety). “How do you produce that key? How do you cross the important thing to somebody? Who owns the handbook course of? It strikes between totally different groups: the safety workforce, the operations workforce, the event and engineering workforce – every of them must be a part of that course of.”

A lot of that is at present constructed round maintaining the secrets and techniques safely saved in a safe vault, itself a single level of worth. Hush calls the vault system a legacy answer, maybe with some justification since Gartner has predicted that 40% of organizations will undertake an method not depending on secrets and techniques by 2027.

The Hush answer is to outline the function of the key key as a coverage throughout the code of the software program being accessed. As a substitute of demanding a key (that would have been stolen and is barely a pseudo id that doesn’t genuinely show something) the coverage defines which machine, or which group of machines, will likely be granted entry to any service.

This coverage could be as tight or as unfastened as necessitated by the extent of danger tolerance of the service being accessed. Entry may very well be restricted to a person laptop, maybe based mostly on its serial quantity, or a variety of different attributes that solely belong to 1 laptop or a gaggle of identified and permitted computer systems. Commercial. Scroll to proceed studying.

It may be conditional: “This machine can entry this service solely between 8:00 am and 4:00 pm,” explains Rave; “That machine can entry that service provided that one other service, like Wiz [now part of Google Cloud, but under DoJ antitrust review] or like Palo Alto, has already advised me that the machine is totally protected. If it’s not utterly protected, don’t let it entry the service.”

Hush might help with the transition to this no-secrets method by mapping all the present interactions and changing them right into a baseline of insurance policies. Continuation then turns into largely a upkeep train, positive tuning present insurance policies and including new insurance policies for brand spanking new interactions.

Whereas the brand new system does require handbook effort in growing and implementing the insurance policies, the Hush platform is based on perception the labor concerned is lower than that required to implement and handle separate keys – and much safer. Credential-based threats, for instance, grow to be a factor of the previous as a result of there aren’t any credentials. “We’ve eradicated the necessity for credentials completely.,” says Rave.

“Chasing secrets and techniques or watching dashboards doesn’t cease assaults,” he continues. “Vaults have been constructed for an period the place environments modified slowly and AI was not a part of the equation. That period is over. AI brokers, ephemeral workloads, and automation have modified the sport, and the vault mannequin can’t sustain.”

Hush Safety (based mostly in Tel Aviv, Israel) was based in 2024 by Micha Rave (CEO), Chen Nisnkorn (CCO), Shmulik Ladkani (CTO), and Alon Horowitz (VP R&D). The funding will likely be used to increase engineering and speed up world GTM efforts.

Associated: Enterprise Secrets and techniques Uncovered by CyberArk Conjur Vulnerabilities

Associated: Palo Alto Networks to Purchase CyberArk for $25 Billion

Associated: GitHub Workflows Assault Impacts Tons of of Repos, 1000’s of Secrets and techniques

Associated: 39 Million Secrets and techniques Leaked on GitHub in 2024

Security Week News Tags:Credential, Eliminate, Emerges, Hush, NoSecrets, Platform, Security, Stealth, Threats

Post navigation

Previous Post: Apple iPhone Air and iPhone 17 Feature A19 Chips With Spyware-Resistant Memory Safety
Next Post: Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs

Related Posts

Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes Security Week News
SAP Zero-Day Targeted Since January, Many Sectors Impacted  Security Week News
Cyber Risk Management Firm Safe Raises $70 Million Security Week News
SAP Patches Critical S/4HANA Vulnerability Security Week News
Mitel Patches Critical Flaw in Enterprise Communication Platform Security Week News
Critical Wing FTP Server Vulnerability Exploited Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform
  • GitLab Patches Multiple Vulnerabilities That Enables Denial Of Service And SSRF Attacks
  • Red Access Raises $17 Million for Agentless Security Platform
  • Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks
  • Google Drive Desktop for Windows Vulnerability Grants Full Access to Another User’s Drive

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform
  • GitLab Patches Multiple Vulnerabilities That Enables Denial Of Service And SSRF Attacks
  • Red Access Raises $17 Million for Agentless Security Platform
  • Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks
  • Google Drive Desktop for Windows Vulnerability Grants Full Access to Another User’s Drive

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News