Mitiga in the News
Mitiga discovers potential hidden dangers in Google Cloud Platform’s (GCP) cloud control plane
Mitiga has uncovered potential hidden dangers in the Cloud Control Plane, with the company saying that there may be significant risk in cloud development caused by not recognising the differences between cloud and traditional definitions of common architecture terms.
Google cloud misconfiguration poses risk to customers
Cloud security vendor Mitiga discovered "dangerous functionality" in the Google Cloud Platform that could allow attackers to compromise virtual machines.
Misconfiguration leaves ‘firewalled’ Google Cloud exposed - report
A dangerous functionality could allow adversaries to remotely access a network deemed secure from outside intruders. Likely a common misconfiguration of Google Cloud systems could leave the network exposed to capable adversaries, researchers at Mitiga, a Cloud Incident Response Company, claim.
Researchers discover ‘dangerous functionality’ in Google Cloud control pane
Today, security researchers at cloud incident response provider Mitiga announced in a blog post they had discovered a “dangerous functionality” in Google Cloud Platform (GCP)’s control pane.
Google Cloud apparently has a security issue even firewalls can't stop
A misconfiguration in Google Cloud Platform has been found which could give threat actors full control over a target virtual machine (VM) endpoint, researchers have said.
Mitiga discovers hidden dangers in Google Cloud Platform’s (GCP) cloud control plane
Mitiga has uncovered hidden dangers in the Cloud Control Plane, with the company saying that there is significant risk in cloud development caused by not recognising the differences between cloud and traditional definitions of common architecture terms.
Researchers discover ‘dangerous functionality’ in Google Cloud control pane
Today, security researchers at cloud incident response provider Mitiga announced in a blog post they had discovered a “dangerous functionality” in Google Cloud Platform (GCP)’s control pane.
Proactive threat hunting is vital to zero-day vulnerability management
It’s well-known that zero-day vulnerabilities pose critical security risks until an effective patch is issued. But, patching a vulnerability doesn’t guarantee that an environment hasn’t already been exploited.
10 Things You Should Do When a Third-Party SaaS Vendor Is Breached
It seems like every few months, security leaders' anxiety spikes due to a new third-party breach, all too aware of the potential security nightmare that could ensue. In March, the Okta breach shocked organizations around the world as they contemplated the potential impact of a breach of the leading identity access management company.