Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar

Posted on June 12, 2025June 12, 2025 By CWS

Jun 12, 2025The Hacker NewsArtificial Intelligence / SaaS Safety
AI is altering every little thing — from how we code, to how we promote, to how we safe. However whereas most conversations concentrate on what AI can do, this one focuses on what AI can break — when you’re not paying consideration.
Behind each AI agent, chatbot, or automation script lies a rising variety of non-human identities — API keys, service accounts, OAuth tokens — silently working within the background.
And here is the issue:
🔐 They’re invisible
🧠 They’re highly effective
🚨 They’re unsecured
In conventional id safety, we defend customers. With AI, we have quietly handed over management to software program that impersonates customers — usually with extra entry, fewer guardrails, and no oversight.
This is not theoretical. Attackers are already exploiting these identities to:

Transfer laterally by cloud infrastructure
Deploy malware through automation pipelines
Exfiltrate information — with out triggering a single alert

As soon as compromised, these identities can silently unlock vital techniques. You aren’t getting a second probability to repair what you may’t see.
In the event you’re constructing AI instruments, deploying LLMs, or integrating automation into your SaaS stack — you are already relying on NHIs. And chances are high, they are not secured. Conventional IAM instruments aren’t constructed for this. You want new methods — quick.
This upcoming webinar, “Uncovering the Invisible Identities Behind AI Brokers — and Securing Them,” led by Jonathan Sander, Area CTO at Astrix Safety, isn’t one other “AI hype” discuss. It is a wake-up name — and a roadmap.

What You will Study (and Really Use)

How AI brokers create unseen id sprawl
Actual-world assault tales that by no means made the information
Why conventional IAM instruments cannot defend NHIs
Easy, scalable methods to see, safe, and monitor these identities

Most organizations do not realize how uncovered they’re — till it is too late.

Watch this Webinar

This session is important for safety leaders, CTOs, DevOps leads, and AI groups who cannot afford silent failure.
The earlier you acknowledge the chance, the quicker you may repair it.
Seats are restricted. And attackers aren’t ready. Reserve Your Spot Now

Discovered this text fascinating? This text is a contributed piece from one in all our valued companions. Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Accounts, Agents, Learn, Run, Secret, Secure, Webinar

Post navigation

Previous Post: Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior
Next Post: New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes

Related Posts

Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More The Hacker News
CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks The Hacker News
Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android The Hacker News
Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods The Hacker News
New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto The Hacker News
Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News