Mitiga in the News
Amazon's AWS SSM agent can be used as post-exploitation RAT malware
Researchers have discovered a new post-exploitation technique in Amazon Web Services (AWS) that allows hackers to use the platform's System Manager (SSM) agent as an undetectable Remote Access Trojan (RAT).
The 10 Hottest Cloud Security Startups In 2023 (So Far)
Cybersecurity startups focused on securing data and identities in cloud environments are among those making big moves during the first half of the year.
How to Get the Most Out of Your Cloud Disaster Recovery Plan
Cloud disaster recovery is a complex field which requires careful diligence to execute properly. Learn some considerations and tips from industry experts.
Google Workspace exploit could let hackers steal your files without leaving any trace
A flaw in Google Workspace could make a hacked account even more troublesome
This Google Workspace security flaw could let hackers quietly steal your Drive files
Experts have uncovered a method for hackers to steal data from people’s Google Drive accounts without leaving any trace of the files they got away with.
Mitiga warns free Google Drive license lacks logging visibility
A security deficiency in Google Workspace could let an attacker exfiltrate data from Google Drive without being traced, a new Mitiga report warned.
Google Drive security flaw allows data to be stolen without trace
Cloud incident response company Mitiga has released research on a significant forensic security deficiency in Google Workspace that enables threat actors to exfiltrate data in Google Drive without any trace.
Human error is threatening Okta passwords, researchers warn
A simple error where Okta users are incorrectly typing their passwords into the username field during login could be leaving them exposed to future attacks.
Post-exploitation attack method exposes Okta passwords
New research reveals a potential post-exploitation attack method in Okta that enables adversaries to read users’ passwords in Okta audit logs.