Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar

Posted on June 12, 2025June 12, 2025 By CWS

Jun 12, 2025The Hacker NewsArtificial Intelligence / SaaS Safety
AI is altering every little thing — from how we code, to how we promote, to how we safe. However whereas most conversations concentrate on what AI can do, this one focuses on what AI can break — when you’re not paying consideration.
Behind each AI agent, chatbot, or automation script lies a rising variety of non-human identities — API keys, service accounts, OAuth tokens — silently working within the background.
And here is the issue:
🔐 They’re invisible
🧠 They’re highly effective
🚨 They’re unsecured
In conventional id safety, we defend customers. With AI, we have quietly handed over management to software program that impersonates customers — usually with extra entry, fewer guardrails, and no oversight.
This is not theoretical. Attackers are already exploiting these identities to:

Transfer laterally by cloud infrastructure
Deploy malware through automation pipelines
Exfiltrate information — with out triggering a single alert

As soon as compromised, these identities can silently unlock vital techniques. You aren’t getting a second probability to repair what you may’t see.
In the event you’re constructing AI instruments, deploying LLMs, or integrating automation into your SaaS stack — you are already relying on NHIs. And chances are high, they are not secured. Conventional IAM instruments aren’t constructed for this. You want new methods — quick.
This upcoming webinar, “Uncovering the Invisible Identities Behind AI Brokers — and Securing Them,” led by Jonathan Sander, Area CTO at Astrix Safety, isn’t one other “AI hype” discuss. It is a wake-up name — and a roadmap.

What You will Study (and Really Use)

How AI brokers create unseen id sprawl
Actual-world assault tales that by no means made the information
Why conventional IAM instruments cannot defend NHIs
Easy, scalable methods to see, safe, and monitor these identities

Most organizations do not realize how uncovered they’re — till it is too late.

Watch this Webinar

This session is important for safety leaders, CTOs, DevOps leads, and AI groups who cannot afford silent failure.
The earlier you acknowledge the chance, the quicker you may repair it.
Seats are restricted. And attackers aren’t ready. Reserve Your Spot Now

Discovered this text fascinating? This text is a contributed piece from one in all our valued companions. Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Accounts, Agents, Learn, Run, Secret, Secure, Webinar

Post navigation

Previous Post: Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior
Next Post: New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes

Related Posts

Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials The Hacker News
How VexTrio and Affiliates Run a Global Scam Network The Hacker News
CISO’s Guide To Web Privacy Validation And Why It’s Important The Hacker News
New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims The Hacker News
MirrorFace Targets Japan and Taiwan with ROAMINGMOUSE and Upgraded ANEL Malware The Hacker News
251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday
  • HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • SimpleHelp Vulnerability Exploited Against Utility Billing Software Users
  • Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday
  • HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • SimpleHelp Vulnerability Exploited Against Utility Billing Software Users
  • Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News