Blog
Sharing Mitiga’s latest threat intelligence and research, cloud IR insights, and company news
Frost & Sullivan’s Latest 2025 Frost Radar: The Need for Runtime Cloud Security in a Cloud-First World
Heading
Cloud breaches rose 35% year over year in 2024, and legacy security tools are failing to keep up. The rapid sprawl of multi-cloud and SaaS has shattered the assumptions baked into legacy, on-prem, and endpoint-focused security stacks, which can’t keep pace with today’s dynamic attack surfaces.
The Remote Worker Scam: Understanding the North Korean Insider Threat
Heading
Recent investigations have uncovered a sophisticated scheme by North Korean operatives to exploit remote work policies in the U.S. tech industry.
Hackers in Aisle 5: What DragonForce Taught Us About Zero Trust
Heading
In a chilling reminder that humans remain the weakest component in cybersecurity, multiple UK retailers have fallen victim to a sophisticated orchestrated cyber-attack by the hacking group known as DragonForce. But this breach was not successful using a zero-day application vulnerability or a complex attack chain. It was built on trust, manipulation, and a cleverly deceptive phone call.
No One Mourns the Wicked: Your Guide to a Successful Salesforce Threat Hunt
Heading
Salesforce is a cloud-based platform widely used by organizations to manage customer relationships, sales pipelines, and core business processes.
Tag Your Way In: New Privilege Escalation Technique in GCP
Heading
GCP offers fine-grained access control using Identity and access management (IAM) Conditions, allowing organizations to restrict permissions based on context like request time, resource type and resource tags.
Who Touched My GCP Project? Understanding the Principal Part in Cloud Audit Logs – Part 2
Heading
This second part of the blog series continues the path to understanding principals and identities in Google Cloud Platform (GCP) Audit Logs. Part one introduced core concepts around GCP logging, the different identity types, service accounts, authentication methods, and impersonation.
Rippling Turning Into a Tsunami
Heading
In today’s digital workspace, SaaS applications like Slack, Google Drive, and Microsoft Teams have become the backbone of business communication and collaboration.
Uncovering Hidden Threats: Hunting Non-Human Identities in GitHub
Heading
In the last few days, two compromised GitHub Actions are actively leaking credentials, and a large-scale OAuth phishing campaign is exploiting developer trust.
Make Cloud Attacks Yesterday’s Problem with Mitiga at RSA Conference 2025
Heading
Visit Mitiga at booth number N-4618 at RSA Conference 2025 to learn about cloud detection and response.