MITIGA LABS
Welcome to Mitiga Labs, our research and innovation arm built to expose how modern attackers operate in Cloud and SaaS. We break down real campaigns and publish practical guidance tohelp security teams stop cloud attacks from having impact. Our research powers the Zero-Impact Breach Prevention approach at the core of the Mitiga platform.


The Cloud Attack Campaigns and Research that Defined a Year.
2025 was the year the threat got smarter. Attackers skipped zero-days and walked in through trusted identities, OAuth links, API chains, and lateral SaaS paths.
LET THEM COME
A Threat Intelligence Report from Mitiga Labs

Mitiga Labs is where we tear into the latest Cloud, SaaS, AI, and Identity attacks. Our researchers decode how adversaries operate and turn that knowledge into defense strategies that stop cloud attacks from having impact. Every discovery fuels Mitiga’s Zero-Impact Breach Prevention.
Explore the latest discoveries, deep dives, and technical how-tos from the Mitiga Labs team. Our research is dedicated to informing defenders and disrupting attackers.
Cloud Threat Hunting: From Events to Attack Chains
Mitiga Labs shows how cloud threat hunting connects identity, control-plane, and data-plane evidence into attack chains defenders can investigate and contain.
Read MoreRESEARCHERS
Ucha GobejishviliClaude Code MCP Token Theft: MitM Attack Explained
Mitiga Labs shows how Claude Code MCP configuration can be hijacked through ~/.claude.json to steal OAuth tokens, persist through rotation, and hide in trusted SaaS activity.
Read MoreRESEARCHERS
Idan CohenShinyHunters, Snowflake, and Rockstar: Another SaaS Leads to Compromise
ShinyHunters leveraged stolen SaaS tokens from Anodot to access Snowflake data, impacting firms like Rockstar Games in a growing supply chain breach scenario.
Read MoreRESEARCHERS
Idan CohenDefining Blast Radius in Cloud Incidents
A practitioner's guide to scoping impact, isolating affected systems, and containing incidents across cloud-native infrastructure
Read MoreRESEARCHERS
Ucha GobejishviliSlack Compromise via Claude Code: Managing AI Agent Security Risks
Mitiga investigates a Slack compromise involving Claude Code skills. Learn to identify AI agent security risks through forensic log analysis and containment.
Read MoreRESEARCHERS
Idan CohenThe next critical capability for Mitiga's Al-native CDR platform is here.
Explore our solution that empowers and automates SecOps, protects AI infrastructure, and defends against AI-sclaed attacks.