Blog
Sharing Mitiga’s latest threat intelligence and research, cloud IR insights, and company news
Tag Your Way In: New Privilege Escalation Technique in GCP
GCP offers fine-grained access control using Identity and access management (IAM) Conditions, allowing organizations to restrict permissions based on context like request time, resource type and resource tags.
Who Touched My GCP Project? Understanding the Principal Part in Cloud Audit Logs – Part 2
This second part of the blog series continues the path to understanding principals and identities in Google Cloud Platform (GCP) Audit Logs. Part one introduced core concepts around GCP logging, the different identity types, service accounts, authentication methods, and impersonation.
Rippling Turning Into a Tsunami
In today’s digital workspace, SaaS applications like Slack, Google Drive, and Microsoft Teams have become the backbone of business communication and collaboration.
Uncovering Hidden Threats: Hunting Non-Human Identities in GitHub
In the last few days, two compromised GitHub Actions are actively leaking credentials, and a large-scale OAuth phishing campaign is exploiting developer trust.
Make Cloud Attacks Yesterday’s Problem with Mitiga at RSA Conference 2025
Visit Mitiga at booth number N-4618 at RSA Conference 2025 to learn about cloud detection and response.
Is Your CDR Vision Cloudy? Why Complete, Panoramic Visibility Across SaaS, Identity, and Infrastructure is a Must
Security teams need to recognize the shortcomings of traditional cloud security approaches and learn why agentless panoramic visibility is a must for effective CDR.
Hunting Conditional Access Policy Bypass in the Wild: Leveraging Malicious Browser Extensions for Seamless Initial Access
Mitiga’s threat detection and investigation experts conduct a threat hunt showing how attackers can bypass credential collection techniques to gain access to further information.
The Rising Threat of AI-Enabled Adversaries: Preparing for the Next Wave of Cloud and SaaS Attacks
Learn how adversaries weaponize AI technology and strategies to defend against AI-enabled threats.
10 Strategies to Communicate Cloud Security Gaps to Leadership
Read actionable strategies to communicate cloud security gaps and recommendations to leadership.