Doron Karmi

Doron Karmi

Senior Security Researcher

Doron Karmi works as a senior Incident Response Researcher at Mitiga. Prior to working at Mitiga, Doron worked as a malware analyst and threat hunter for large organizations.

No One Mourns the Wicked: Your Guide to a Successful Salesforce Threat Hunt

Heading

Salesforce is a cloud-based platform widely used by organizations to manage customer relationships, sales pipelines, and core business processes.

May 8, 2025

Microsoft Breach by Midnight Blizzard (APT29): What Happened?

Heading

Understand the Midnight Blizzard Microsoft breach by APT29, what happened, and key steps organizations should take to strengthen their defenses.

February 27, 2024

Ransomware Strikes Azure Storage: Are You Ready?

Heading

There’s been a recent surge in cloud ransomware attacks. Examples of such attacks were observed by Sophos X-Ops, which detected the ransomware group BlackCat/ALPHV using a new Sphinx encryptor variant to encrypt Azure storage accounts by employing stolen Azure Storage account keys. The BlackCat/ALPHV ransomware group is the same entity that claimed responsibility for infiltrating MGM’s infrastructure and encrypting more than 100 ESXi hypervisors.

September 19, 2023

How Okta Passwords Can Be Compromised: Uncovering a Risk to User Data

Heading

Mitiga's research team uncovered a data risk to Okta users due to passwords that can be present in logs. This article outlines the risk and attack method.

March 23, 2023

Guide: CircleCI Breach Cybersecurity Incident Hunting Guide

Heading

Learn how to investigate the CircleCI breach with Mitiga’s technical guide to assist organizational threat hunting efforts.

January 10, 2023

Oops, I Leaked It Again — How Mitiga Found PII in Exposed Amazon RDS Snapshots

Heading

A recent Mitiga Research Team investigation found the well-regarded Amazon Relational Database Service is leaking PII via exposed RDS Snapshots.

November 16, 2022

How Identifying UserData Script Manipulation Accelerates Investigation

Heading

UserData script manipulation by threat actors is a technique that has been known in the wild for several years and has been observed being exploited by many attack groups, but monitoring and detecting malicious manipulation of user data script is not trivial with standard AWS Cloudtrail logging.

June 24, 2022