Mitiga in the News
SC Awards Finalists: Innovator of the Year
Bad actors rapidly evolve their tactics. Security companies, therefore, need to evolve faster. And they need leaders to drive that effort.
The rise of double extortion ransomware
With the use of this tactic increasing, we look at how you can protect your business
WannaCry Ransomware Attack 5-year Anniversary. Cybersecurity Experts React.
It is May 12th, and today marks the 5th year anniversary of the WannaCry ransomware attacks. Five years on, and ransomware attacks continue to proliferate and cause widespread societal disruption and loss. VMblog is sharing insights from a few cybersecurity industry experts.
Five years after the WannaCry ransomware attack
It’s been five years since the WannaCry ransomware attack spread like wildfire, encrypting hundreds of thousands of important and high-profile systems.
Five years on from WannaCry -- what have we learned?
Today marks the fifth anniversary of the notorious WannaCry ransomware attack which hit a number of large organizations around the world and was many people's first encounter with ransomware.
Issue 184: RCE in F5 BIG-IP suite, API security maturity, hardening GCP implementations
This week, we have news of a high severity remote code execution (RCE) vulnerability in the F5 BIG-IP security suite. We also feature an article from Curity on API security maturity, an article on hardening Google Cloud Platform implementations, and finally a threat matrix for GraphQL APIs.
Misconfiguration Identified in Google Cloud Platform
A misconfiguration discovered in the Google Cloud Platform could allow threat actors to gain complete control over virtual devices by exploiting legitimate features in the system, researchers at Mitiga, a Cloud Incident Response firm, stated.
Misconfiguration Identified in Google Cloud Platform
A misconfiguration discovered in the Google Cloud Platform could allow threat actors to gain complete control over virtual devices by exploiting legitimate features in the system, researchers at Mitiga, a Cloud Incident Response firm, stated.
The CyberWire Daily Briefing V11 Issue 88
The biggest risk in cloud development is not recognizing the differences between cloud and traditional definitions of common architecture terms. For example, imagine a system that is completely “firewalled off”—a firewall prevents any inbound or outbound connections from the machine.