Blog
Sharing Mitiga’s latest threat intelligence and research, cloud IR insights, and company news
Helios AI: Why Cloud Security Needs Intelligent Automation Now
Heading
Mitiga launches Helios AI, an intelligent cloud security solution that automates threat detection and response. Its first feature, AI Insights, cuts through noise, speeds up analysis, and boosts SecOps efficiency.
Iran’s Evolving Cyber Arsenal: What Security Teams Need to Know Now
Heading
Iran’s cyber program has become one of the most active and aggressive nation-state threats today. From wiper malware and OT sabotage to disinformation and espionage campaigns, Iranian threat actors are targeting critical sectors across the globe, including finance, energy, healthcare, and government.
Frost & Sullivan’s Latest 2025 Frost Radar: The Need for Runtime Cloud Security in a Cloud-First World
Heading
Cloud breaches rose 35% year over year in 2024, and legacy security tools are failing to keep up. The rapid sprawl of multi-cloud and SaaS has shattered the assumptions baked into legacy, on-prem, and endpoint-focused security stacks, which can’t keep pace with today’s dynamic attack surfaces.
From Breach Response to Platform Powerhouse: Ofer Maor on Building Mitiga for Cloud, SaaS, and Identity Security
Heading
Solutions Platform Helios AI Cloud Security Data Lake Cloud Threat Detection Investigation and Response Readiness (TDIR) Cloud Detection and Response (CDR) Cloud Investigation and Response Automation (CIRA) Investigation Workbench Managed Services Managed Cloud Detection and Response (C-MDR) Cloud Managed Threat Hunting Cloud and SaaS Incident Response Resources Blog Mitiga Labs Resource Library Incident Response Glossary Company About Us Team Careers Contact Us In the News Home » Blog Main BLOG From Breach Response to Platform Powerhouse: Ofer Maor on Building Mitiga for Cloud, SaaS, and Identity Security In this premiere episode of Mitiga Mic, Mitiga’s Co-founder and CTO Ofer Maor joins host Brian Contos to share the journey behind Mitiga’s creation—and how it became the first purpose-built platform for cloud, SaaS, and identity detection and response. Ofer discusses why traditional incident response falls short in modern environments, how Mitiga built its platform from real-world service experience, and the crucial role of automation and AI in modern SOC operations.
The Remote Worker Scam: Understanding the North Korean Insider Threat
Heading
Recent investigations have uncovered a sophisticated scheme by North Korean operatives to exploit remote work policies in the U.S. tech industry.
Hackers in Aisle 5: What DragonForce Taught Us About Zero Trust
Heading
In a chilling reminder that humans remain the weakest component in cybersecurity, multiple UK retailers have fallen victim to a sophisticated orchestrated cyber-attack by the hacking group known as DragonForce. But this breach was not successful using a zero-day application vulnerability or a complex attack chain. It was built on trust, manipulation, and a cleverly deceptive phone call.
No One Mourns the Wicked: Your Guide to a Successful Salesforce Threat Hunt
Heading
Salesforce is a cloud-based platform widely used by organizations to manage customer relationships, sales pipelines, and core business processes.
Tag Your Way In: New Privilege Escalation Technique in GCP
Heading
GCP offers fine-grained access control using Identity and access management (IAM) Conditions, allowing organizations to restrict permissions based on context like request time, resource type and resource tags.
Who Touched My GCP Project? Understanding the Principal Part in Cloud Audit Logs – Part 2
Heading
This second part of the blog series continues the path to understanding principals and identities in Google Cloud Platform (GCP) Audit Logs. Part one introduced core concepts around GCP logging, the different identity types, service accounts, authentication methods, and impersonation.