Blog
Sharing Mitiga’s latest threat intelligence and research, cloud IR insights, and company news
Google Cloud Platform Exfiltration: A Threat Hunting Guide
Heading
If you’re wondering if the cloud era is here, you need only look at the latest stats. 67% of enterprise infrastructure is now cloud-based and 94% of enterprises use cloud services.1 It’s no wonder that public clouds like Google Cloud Platform (GCP) have become a new playground for threat actors. There is a lot to exploit.
Mitiga Security Advisory: Insufficient Forensic Visibility in GCP Storage
Heading
As part of Mitiga’s continuous research into cloud attacks and forensics, we have been examining potential data exfiltration techniques in GCP (Google Cloud Platform) and how to identify and investigate them. During this research, we discovered a significant forensic security deficiency in Google Cloud Storage that enables a threat actor to exfiltrate in a covert manner.
Former Mandiant COO and President John Watters Joins Mitiga as Independent Board Member
Heading
Cybersecurity veteran brings 30+ years of cybersecurity experience, building companies and M&A, most recently selling to Google for $5.4B.
Guide: CircleCI Breach Cybersecurity Incident Hunting Guide
Heading
Learn how to investigate the CircleCI breach with Mitiga’s technical guide to assist organizational threat hunting efforts.
If It Scares You, It Might Be Good to Try — Monorepo and Dynamically Configured CI
Heading
In this blog, Mitiga Devops Engineer Stav Ochakovski addresses our organizational monorepo shift and why it triggered a CI adjustment, as well.
Elastic IP Hijacking — A New Attack Vector in AWS
Heading
Read Mitiga research about a new post-exploitation attack method, a new way that enables adversaries to hijack public IP addresses for malicious purposes.
Oops, I Leaked It Again — How Mitiga Found PII in Exposed Amazon RDS Snapshots
Heading
A recent Mitiga Research Team investigation found the well-regarded Amazon Relational Database Service is leaking PII via exposed RDS Snapshots.
Uber Cybersecurity Incident: Which Logs Do IR Teams Need to Focus On?
Heading
On September the 16th, Uber announced they experienced a major breach in their organization in which malicious actor was able to log in and take over multiple services and internal tools used at Uber. What are some of the logs that IR teams should be focusing on in their investigation?
Advanced BEC Scam Campaign Targeting Executives on O365
Heading
Mitiga spotted a sophisticated, advanced business email compromise (BEC) campaign, directly targeting relevant executives of organizations (mostly CEOs and CFOs) using Office 365.