Blog
Sharing Mitiga’s latest threat intelligence and research, cloud IR insights, and company news
10 Recommendations for Your Organization to Increase Readiness Following the Okta Breach
We all woke up recently to a security nightmare. Okta, an industry leader in identity and access management is potentially breached and the impact for the industry may be very high. Here are 10 actionable recommendations you can share, but please let us know if you have more so that we can add them to this list.
What is the Spring4Shell exploit? An overview of the Spring vulnerability
Spring is a Java framework for dependency injection and Model-View-Controller (MVC) web development. Spring is a very popular framework; over 6,000 other libraries use the "spring-beans" library (according to Maven Central). Spring4Shell, a new exploit in Spring, was just disclosed.
Understanding Your Okta Logs to Hunt for Evidence of an Okta Breach
Understand your Okta system logs with this comprehensive guide, helping you enhance security, monitor activity, and respond effectively to incidents.
Here's Why Traditional Incident Response Doesn’t Work in the Cloud
Traditional incident response (IR) learned from on-premises investigations doesn’t work in the cloud. Today's threat actors are finding misconfigurations and vulnerabilities to allow them to penetrate cloud environments.
Ready or Not: Russian Attack on Ukraine Brings Global Cybersecurity Impacts
The Russian military strategy is often described as a strategy of “active defense.” This means that their strategy includes both the preventative measures taken before a conflict breaks out and the tenets for conducting the war.
Understanding Lateral Movement Attacks in Hybrid Environments
What Are the Dangers of a Lateral Movement Attack in a Hybrid Environment?
Learn how lateral movement attacks pose serious risks in on-prem, cloud, or hybrid environments, and discover effective strategies to mitigate these threats.
The ultimate cybercriminal gift list: undisclosed zero-day vulnerabilities
Over the last few months, everyone has been busy patching — seeking to close the loophole most learned about when the a patch was released for Log4j 2.15.0 for Java 8 users to address the remote code execution vulnerability CVE-2021-44228, a previously undisclosed zero-day vulnerability.
Rethinking zero-day vulnerabilities vs. one-days to increase readiness
Because zero-day vulnerabilities are announced before security researchers and software developers have a patch available, zero-day vulnerabilities pose a critical risk to organizations as criminals race to exploit them. Similarly, vulnerable systems are exposed until a patch is issued and applied.
Rethinking Crown Jewels Analysis: Mitigating Cybersecurity Bias
Uncover the risks of bias in Crown Jewels Analysis (CJA) and learn strategies to protect your organization's most valuable assets with a comprehensive approach.