Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
AI companies leaking sensitive information on GitHub
How do cyberattacks influence business and financial planning in large...
Petnow Forms U.S. Partnership to Advance Digital Pet Identification Ac...
Fescaro enters agricultural machinery cybersecurity with Daedong
Data protection starts with visibility and control
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Staying resilient against the invisible onslaught of AI-powered attacks

      Staying resilient against the invisible onslaught of AI-powered attacks

      Tuesday, November 11, 2025, 11:27 AM Asia/Singapore | Features
    • Featured

      Tackling the risks of AI innovations in the cloud

      Tackling the risks of AI innovations in the cloud

      Wednesday, November 5, 2025, 10:36 AM Asia/Singapore | Features
    • Featured

      Weaponization of GenAI by adversaries

      Weaponization of GenAI by adversaries

      Wednesday, November 5, 2025, 10:15 AM Asia/Singapore | Features, Newsletter
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

NewsTips

AI companies leaking sensitive information on GitHub

By CybersecAsia editors | Wednesday, November 12, 2025, 5:06 PM Asia/Singapore

AI companies leaking sensitive information on GitHub

With rapid AI innovation outpacing basic cybersecurity practices, non-human agents and automated processes are creating machine identities at scale, leading to inadvertent leakage of API  keys, tokens and credentials.

A new study by Wiz has revealed that nearly two-thirds of leading private AI companies have leaked sensitive information such as API keys, tokens, and credentials on GitHub. 

The research suggested that rapid innovation in AI is outpacing basic cybersecurity practices. Among the most commonly leaked credentials were API keys from ElevenLabs and HuggingFace, some of the most used AI tools today, and these leaks may allow threat actors access to private training data or organizational information.

According to Shane Barney, CISO, Keeper Security, the Wiz report highlights the growing challenge of managing machine-based credentials at scale, and demonstrates why visibility and control are important. 

“The discovery of exposed API keys, tokens and other programmatic secrets across leading AI companies shows how quickly machine-to-machine connections can expand as development and automation accelerate. Each of these credentials represents an access pathway that, if left unsecured, can expose sensitive systems or data,” he commented.

Machine identities, critical to today’s business operations, are growing at an exponential rate as organizations adopt AI and cloud-native development, and the number of non-human accounts and automated processes continues to rise. However, they often exist outside traditional identity and access management frameworks. 

“When visibility into those credentials is limited, risk spreads quietly across systems that are otherwise well protected,” said Barney. 

What to do

Barney advised: “Reducing that risk requires sustained visibility and control, as well as a centralized enterprise-level approach to managing secrets. Continuous monitoring for exposed secrets, automated credential rotation and least-privilege access policies help contain exposure without slowing innovation. Treating machine-based credentials with the same rigor applied to human users strengthens both resilience and operational trust.”

Additionally, he said: “Implementing Privileged Access Management (PAM) in conjunction with secrets management extends that visibility and control even further. PAM enforces strict access boundaries and accountability for elevated permissions, while secrets management ensures that credentials used by systems and applications are securely stored, rotated and monitored.” 

Together, these controls create a unified framework for managing both human and non-human identities, reducing credential sprawl and limiting the potential impact of an exposure.

“The Wiz findings serve as a reminder that as technology grows more intelligent and interconnected, security must keep equal pace,” concluded Barney. “The fundamentals still apply: know what identities exist, understand what they can access and ensure those privileges are tightly governed.” 

Share:

PreviousHow do cyberattacks influence business and financial planning in large organizations?

Related Posts

CISA issues warning on a CVSS 9.8 vulnerability, but no active exploits found

CISA issues warning on a CVSS 9.8 vulnerability, but no active exploits found

Wednesday, August 21, 2024

And you thought self updating apps were always safe!

And you thought self updating apps were always safe!

Wednesday, May 3, 2023

What trends are reshaping the security industry this year?

What trends are reshaping the security industry this year?

Friday, March 3, 2023

Mid-game e-sports wallhacking: will organizers finally take the hint?

Mid-game e-sports wallhacking: will organizers finally take the hint?

Thursday, April 4, 2024

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Upgrading biometric authentication system protects customers in the Philippines: UnionDigital Bank

    Upgrading biometric authentication system protects customers in the Philippines: UnionDigital Bank

    An improved dual-liveness biometric framework can counter more deepfake threats, ensure compliance, and protect underbanked …Read more
  • HOSTWAY gains 73% operational efficiency for private cloud operations  

    HOSTWAY gains 73% operational efficiency for private cloud operations  

    With NetApp storage solutions, the Korean managed cloud service provider offers a lean, intelligent architecture, …Read more
  • CISOs can navigate emerging risks from autonomous AI with a new security framework

    CISOs can navigate emerging risks from autonomous AI with a new security framework

    See how security leaders can adopt layered strategies addressing intent, governance, and oversight to manage …Read more
  • MoneyMe strengthens fraud prevention and credit decisioning

    MoneyMe strengthens fraud prevention and credit decisioning

    Australian fintech strengthens risk management with SEON to scale lending operations securely and efficiently.Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.