Blog
Sharing Mitiga’s latest threat intelligence and research, cloud IR insights, and company news
Uncovering Hidden Threats: Hunting Non-Human Identities in GitHub
In the last few days, two compromised GitHub Actions are actively leaking credentials, and a large-scale OAuth phishing campaign is exploiting developer trust.
Make Cloud Attacks Yesterday’s Problem with Mitiga at RSA Conference 2025
Visit Mitiga at booth number N-4618 at RSA Conference 2025 to learn about cloud detection and response.
Is Your CDR Vision Cloudy? Why Complete, Panoramic Visibility Across SaaS, Identity, and Infrastructure is a Must
Security teams need to recognize the shortcomings of traditional cloud security approaches and learn why agentless panoramic visibility is a must for effective CDR.
Hunting Conditional Access Policy Bypass in the Wild: Leveraging Malicious Browser Extensions for Seamless Initial Access
Mitiga’s threat detection and investigation experts conduct a threat hunt showing how attackers can bypass credential collection techniques to gain access to further information.
The Rising Threat of AI-Enabled Adversaries: Preparing for the Next Wave of Cloud and SaaS Attacks
Learn how adversaries weaponize AI technology and strategies to defend against AI-enabled threats.
10 Strategies to Communicate Cloud Security Gaps to Leadership
Read actionable strategies to communicate cloud security gaps and recommendations to leadership.
5 Tips to Address the Cybersecurity Skills Gap
5 Tips to Address the Cybersecurity Skills Gap in 2025
Cybersecurity leaders face challenges with the ongoing skills gap. Learn five strategies and tips to address these challenges.
IaaS vs PaaS vs SaaS: What Are the Differences?
IaaS vs. PaaS vs. SaaS: What Are the Differences?
Learn the different methods businesses use to build, manage, and scale digital infrastructure.
EKS Role Unchaining: Tracing AWS Events Back to Pods for Enhanced Security
EKS Role Unchaining: Tracing AWS Events Back to Pods for Enhanced Security
Learn two approaches for EKS unchaining that allow teams to associate AWS events with the pods that triggered them.