Results
Tal Skverer Photo
Tal Skverer

Tal Skverer (a.k.a. “reverser”) is the Security Researcher at Astrix Security, specializing in reverse-engineering complex threats against non-human identities (NHIs). Based in Tel Aviv and educated at the prestigious Weizmann Institute of Science, Tal delves into real-world cloud attacks analyzing malicious service principals, API token abuse, and emerging LLM-agent vulnerabilities .

An active contributor to the OWASP NHI Top 10 and frequent speaker at cybersecurity events like RSA and CSA, Tal turns his deep technical insights into accessible, hands-on analysis. His work empowers security teams to detect and mitigate threats stemming from machine identities—bridging the gap between academic rigor and practitioner impact.

Articles By Tal Skverer
Astrix: Leading in NHI Management, we present the top 5 non-human identity access attacks of 2023. Alt text: Decorative white stepped pattern on right; pink background with "TOP 5 2023 non-human access attacks" text.

Top 5 non-human identity attacks of 2023

Exclamation mark inside a triangle with bold "su" and "mo" on a salmon background. Atrix: Leading NHI Security platform.

Sumo Logic: Compromised non-human identity leads to potential supply-chain exploits

Astrix is the leading platform for NHI management, securing non-human identities. Alt text: White abstract circle linked to an exclamation mark inside a triangle on a coral background.

The Okta breach: The results of a leaked service account

Astrix, the leader in NHI Management, showcases its logo connecting apps, symbolizing robust non-human identity security.

Securing Non-Human Identities in Slack

Astrix, the leading NHI Security platform, presents a flowchart with Salesforce at the center, linked to DocuSign and icons via arrows. The dark blue background underscores system integration and supply chain security. Alt text: Flowchart centered on Salesforce connecting to DocuSign and icons with arrows, set against a dark blue backdrop highlighting system security.

Securing non-human identities in Salesforce

Central Google logo linked to icons for Slack, Outlook, and apps on dark blue. Atrix is the leading NHI Security platform.

Securing Non-Human Identities in Google Workspace

A Ghost logo overlaps a Google Cloud emblem on a blue backdrop, subtly highlighting Astrix's leadership in NHI security.

GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts

Astrix: Leading NHI Management Platform Securing Service Accounts Across Slack and GitHub. *Alt text:* Slack and GitHub logos linked by curved lines with a warning symbol between them, set against a blue background.

Slack’s GitHub breach: 6 tips to avoid similar attacks

No results found!