Latest from the Labs
Explore the latest discoveries, deep dives, and technical how-tos from the Mitiga Labs team. Our research is dedicated to informing defenders and disrupting attackers.
Hackers in Aisle 5: What DragonForce Taught Us About Zero Trust
Heading
In a chilling reminder that humans remain the weakest component in cybersecurity, multiple UK retailers have fallen victim to a sophisticated orchestrated cyber-attack by the hacking group known as DragonForce. But this breach was not successful using a zero-day application vulnerability or a complex attack chain. It was built on trust, manipulation, and a cleverly deceptive phone call.
No One Mourns the Wicked: Your Guide to a Successful Salesforce Threat Hunt
Heading
Salesforce is a cloud-based platform widely used by organizations to manage customer relationships, sales pipelines, and core business processes.
Tag Your Way In: New Privilege Escalation Technique in GCP
Heading
GCP offers fine-grained access control using Identity and access management (IAM) Conditions, allowing organizations to restrict permissions based on context like request time, resource type and resource tags.
Who Touched My GCP Project? Understanding the Principal Part in Cloud Audit Logs – Part 2
Heading
This second part of the blog series continues the path to understanding principals and identities in Google Cloud Platform (GCP) Audit Logs. Part one introduced core concepts around GCP logging, the different identity types, service accounts, authentication methods, and impersonation.
Rippling Turning Into a Tsunami
Heading
In today’s digital workspace, SaaS applications like Slack, Google Drive, and Microsoft Teams have become the backbone of business communication and collaboration.
Uncovering Hidden Threats: Hunting Non-Human Identities in GitHub
Heading
In the last few days, two compromised GitHub Actions are actively leaking credentials, and a large-scale OAuth phishing campaign is exploiting developer trust.
Hunting Conditional Access Policy Bypass in the Wild: Leveraging Malicious Browser Extensions for Seamless Initial Access
Heading
Mitiga’s threat detection and investigation experts conduct a threat hunt showing how attackers can bypass credential collection techniques to gain access to further information.
EKS Role Unchaining: Tracing AWS Events Back to Pods for Enhanced Security
Heading
Learn two approaches for EKS unchaining that allow teams to associate AWS events with the pods that triggered them.
How Missing Logs Impact Cloud Security
Heading
Microsoft experienced an issue with internal monitoring agents, resulting in incomplete logs for some services. Get more details and recommended next steps.