Most identity security tools focus on human identities or non-human identities. Attackers don't make that choice.

A real attack chain: social engineering call gets a password reset. That access authorizes a new OAuth app. The OAuth app pivots to a service account with broader permissions.

Three identity types. One attack. Most tools see fragments.

Auth Sentry monitors both in a single graph: gethumming.io/how-it-works
#IdentitySecurity #ITDR #CyberSecurity #NHI

Voice phishing is now one of the most effective initial access methods in recent incident data.

The attack doesn't beat your technical controls. It convinces someone to bypass them.

No suspicious login. Nothing to filter. A valid credential, handed over through normal procedures.

What IS detectable: behavior after the handover. The attacker doesn't move like the legitimate user. Auth Sentry catches it.

gethumming.io/how-it-works

#ITDR #IdentitySecurity #Vishing #CyberSecurity

You already know it's there.

The unreviewed service accounts. The abandoned tokens. The access that should've been cleaned up when people left but wasn't.

The gap between "we know" and "we've acted" is one of the most common realities in security
operations.

Not a motivation problem. A visibility and prioritization problem.

Auth Sentry Monitor was built for this moment. Always free, no sales call:
gethumming.io/monitor

#IdentitySecurity #ITDR #SecurityOps #CyberSecurity

Attacker hand-off times have dropped from hours to seconds. Dwell times are rising. Attackers are moving faster when active, while staying hidden longer during persistence.

They're not racing your detection window. They're operating comfortably inside it.

Detection that waits for a breach event is already behind. The window is during persistence in the behavioral signals that appear before the objective is reached.

That's where Auth Sentry operates: gethumming.io
#ITDR #CyberSecurity

You already know it's there.

The unreviewed service accounts. The abandoned tokens. The access that should've been cleaned up when people left but wasn't.

The gap between "we know this exists" and "we've done something about it" is one of the most common realities in security operations.

Not a motivation problem. A visibility and prioritization problem.

Auth Sentry Monitor was built for exactly this moment.

Free. No sales call: gethumming.io/monitor
#IdentitySecurity #ITDR #CyberSecurity

Trivy supply chain attack: Aqua rotated credentials to cut off the attacker. The attacker stayed in using valid logins.

Mandiant: 1,000+ impacted SaaS environments.

Credential rotation is the right response, but not sufficient when the attacker already has valid access that looks legitimate to everything watching.

Behavioral detection during the persistence phase is the other half.
Try us free: gethumming.io

#Trivy #ITDR #CyberSecurity

Full article: 👇 https://cyberscoop.com/trivy-supply-chain-attack-aqua-downstream-extortion-fallout/?utm_source=dlvr.it&utm_medium=twitter

Experts warn of a ‘loud and aggressive’ extortion wave following Trivy hack

Attackers compromised the open-source security tool and published malicious versions of the software. Mandiant warns the fallout could impact up to 10,000 downstream victims.

CyberScoop

Identity debt is the accumulated cost of decisions that made sense at the time.

Abandoned OAuth tokens. Service accounts from old projects.
Over-permission fixes that would've taken time no one had to fix...

Pragmatic then. Compounding now.
Like code debt, you can't prioritize what you can't see.

Auth Sentry Monitor inventories human & non-human identities, blast radius analysis, & relationship mapping FREE

gethumming.io/monitor

#IdentitySecurity #ITDR #IdentityManagement #CyberSecurity

Most identity threat detection fires after the attacker has authenticated.
By then, you're not preventing anything, you're containing it.

The behavioral signals that precede an identity attack are detectable earlier. A password spray generates a distinct pattern across providers during the attempt phase, before a single login succeeds.

Sub-5-second detection. Complete investigations, not raw alerts.

gethumming.io

#ITDR #IdentitySecurity #ThreatDetection #CyberSecurity

Explore how Identity Threat Detection and Response enhances modern IAM security, ensuring robust protection against identity-based attacks.

https://iamdevbox.com/posts/pingone-aic-api-rest-endpoints-for-iam/?utm_source=mastodon&utm_medium=social&utm_campaign=blog_post

#iam #security #itdr #devbox

Your IdP tracks the identities provisioned through it.

OAuth tokens granted directly by employees? Outside its view. Service accounts in cloud infrastructure? Not in Okta. SaaS-to-SaaS integrations? Authenticating independently.

Your IdP reports on what it knows about. It was never designed to see across systems it doesn't control.
A full identity inventory requires connecting across providers not just reading from one.

Get Auth Sentry Monitor free: gethumming.io/monitor
#ITDR #CyberSecurity