• Customers
Sign in

Integrations

Check out our evergrowing list of integrations

Fuse

From raw logs to enriched, correlated intelligence at the speed of ingestion

Detect

Stateful cloud detection with no
tradeoffs

Investigate

See how the attack began, what the adversary did, and where it could go

Respond

Act precisely.
Recover confidently

Stream Force (Coming soon)

Build, run, and scale agentic security workflows

Shai-Hulud: Another Wave and Going Open Source

Shai-Hulud - the self-propagating npm/PyPI supply-chain worm - is now open source on GitHub, and copycats are already forking it. If your detection strategy depends on recognizing this specific malware, you've lost the next round. The right question is how to detect stolen credentials being used abnormally - invariant across every variant past and future.

All Resources

Learn about cloud detection
and response

Upcoming Events

Meet our team at upcoming
expos and events

Blog

Insights, product updates, and security tips

Datasheets

Technical overviews and product specifications

Reports

Research, analysis, and industry findings

Webinars

Join our live event or watch on
demand

Watch on demand

You Can't Prompt Your Way Out of Bad Data: Why Context, Not Models, Wins in the Cloud

February 6, 2026

About Us

Get to know our story and team

Press

News, articles and press resources

Jobs

Join us, we’re hiring!

Contact Us

Get a Demo
Home
Resources
Tags

#

Secrets

No items found.
GitHub Action Supply Chain Attack Exposes Secrets: What You Need to Know and How to Respond
Cloud Security
GitHub Action Supply Chain Attack Exposes Secrets: What You Need to Know and How to Respond
A widely used GitHub Action, tj-actions/changed-files, was compromised sometime before March 14, 2025 with a malicious payload, leading to the exposure of secrets in public repository logs. The incident has been assigned CVE-2025-30066 and is a stark reminder of the growing risks in the software supply chain.
Or Shoshani
Mar 16, 2025
4
min
How to manage Kubernetes secrets on AWS EKS
Cloud Security
How to manage Kubernetes secrets on AWS EKS
Kubernetes has become a worldwide standard for running container workloads. Nevertheless, working with Kubernetes has its challenges such as dealing with sensitive information that your workload needs to perform proper operations on it and consuming the secret such as passwords, API keys and tokens etc. There are a lot of different solutions that exist in the marketplace to solve this specific problem such as HashiCorp Vault, AWS Secret Manager, Mozilla Secrets Operations etc.
Tal Shladovsky
Tal Shladovsky
May 16, 2023
7
min
Browse other tags
AI SOC
Atlantis
AWS
CDR
CloudTwin
CNAPP
Compliance
Compute
Cost Optimization
Data Security
Disaster Recovery
DSPM
EDR
Flow Logs
Gartner
GitHub
IdP
Kubernetes
Networking
Permissions
re:Invent
Reliability
Resilience
Shift-left
SIEM
SOAR
Stream Traps
Sustainability
Terraform
Troubleshooting
XDR

Product

FuseDetectInvestigateRespond

Resources

Book a demoCustomersBlogWebinarsCloudWiki

Product

About usBecome a PartnerPressJobsContact us

© StreamSec ltd.

Copyright PolicyTerms of UsePrivacy