Search results

Now You See Me: GitHub Logs
www.mitiga.io/blog/now-you-see-me-github-logs

Now You See Me: GitHub Logs. By. Austin Bollinger. Why GitHub Belongs in Your Security Scope. GitHub is how modern organizations often build and maintain software. It’s a DevOps platform.

Uncovering Hidden Threats: GitHub Threat Hunting for Non-Human Identities
www.mitiga.io/blog/uncovering-hidden-threats-hunting-non-human-identities-in-github

Uncovering Hidden Threats: GitHub Threat Hunting for Non-Human Identities. Key Points. GitHub is a Prime Target: Its central role in development makes GitHub attractive to attackers, especially via non-human identities.

Mastering CI/CD Security on GitHub: Expert Insights with Idan Cohen | Mitiga Mic
www.mitiga.io/resources/mastering-ci-cd-security-on-github-expert-insights-with-idan-cohen-mitiga-mic

Mastering CI/CD Security on GitHub: Expert Insights with Idan Cohen | Mitiga Mic.

Inside the AI Supply Chain: Security Lessons from 10,000 Open-Source ML Projects
www.mitiga.io/blog/inside-the-ai-supply-chain-security-lessons-from-10-000-open-source-ml-projects

Analysis of 10,000 open-source AI/ML repositories reveals. 70%. have critical or high-severity vulnerabilities in GitHub Actions workflows, making them prone to attacks like code injection, credential theft, or repo takeover via malicious PRs.

Defending SaaS & Cloud Workflows: Supply Chain Security Insights with Idan Cohen
www.mitiga.io/blog/defending-saas-cloud-workflows-supply-chain-security-insights-with-idan-cohen

GitHub Actions supply chain attack. showed how compromised workflows can expose secrets across thousands of organizations. Key defense practices include. scoping permissions, validating inputs, isolating jobs, and using workflow scanning tools.

Guide: CircleCI Breach Cybersecurity Incident Hunting Guide
www.mitiga.io/blog/circleci-cybersecurity-incident-hunting-guide

Examples of such platforms include: GitHub, for enabling build triggers and GitHub Checks integration. Jira, for reporting the status of builds and deployments in CircleCI Projects. Kubernetes, for managing your Kubernetes Engine clusters and node pools.

ShinyHunters and UNC6395: Inside the Salesforce and Salesloft Breaches
www.mitiga.io/blog/shinyhunters-and-unc6395-inside-the-salesforce-and-salesloft-breaches

GitHub. , AWS, and. Salesforce. Each of these sources has unique logging formats, event types, and contextual nuances that must be interpreted correctly to ensure accurate detection and minimize false positives.

Log4j Vulnerability Fix: Comprehensive Log4Shell Resources
www.mitiga.io/blog/log4shell-everything-in-one-place

GitHub repository. Additionally, more than 200 global companies and manufacturers have already published security advisories and bulletins according to. this list. Leveraging this critical vulnerability, attackers can anonymously exploit remote systems.

More on Abusing the Amazon Web Services SSM Agent as a Remote Access Trojan
www.mitiga.io/blog/abusing-the-amazon-web-services-ssm-agent-as-a-remote-access-trojan

The source code for SSM Agent is available on GitHub: https://github.com/aws/amazon-ssm-agent. The SSM agent can run on Linux, MacOS (EC2 only), and Windows Server.

Is Your CDR Vision Cloudy? Why Complete, Panoramic Visibility Across SaaS, Identity, and Infrastructure is a Must
www.mitiga.io/blog/the-only-viable-cloud-detection-and-response-approach

SaaS applications. like GitHub, Salesforce, Snowflake, and Office 365, alongside cloud. infrastructure. in AWS, GCP, and Azure.