Iran’s cyber program has become one of the most active and aggressive nation-state threats today. From wiper malware and OT sabotage to disinformation and espionage campaigns, Iranian threat actors are targeting critical sectors across the globe, including finance, energy, healthcare, and government.

In this 30-minute live episode of Mitiga Mic, Brian Contos and a panel of experts will walk through the evolution of Iranian cyber capabilities, their key actors and tactics, and what’s changed since 2023, including insights from the recent Iran-Israel conflict and its spillover into U.S. infrastructure. We’ll unpack real-world examples, attack patterns, and actionable recommendations for defending against these threats.

If you're responsible for protecting cloud, enterprise, or critical infrastructure environments, this one is worth your time.

Join us live or recorded afterward on LinkedIn or YouTube.

LAST UPDATED:

June 18, 2025

Don't miss these stories:

Hackers in Aisle 5: What DragonForce Taught Us About Zero Trust

In a chilling reminder that humans remain the weakest component in cybersecurity, multiple UK retailers have fallen victim to a sophisticated orchestrated cyber-attack by the hacking group known as DragonForce. But this breach was not successful using a zero-day application vulnerability or a complex attack chain. It was built on trust, manipulation, and a cleverly deceptive phone call.

No One Mourns the Wicked: Your Guide to a Successful Salesforce Threat Hunt

Salesforce is a cloud-based platform widely used by organizations to manage customer relationships, sales pipelines, and core business processes.

Tag Your Way In: New Privilege Escalation Technique in GCP

GCP offers fine-grained access control using Identity and access management (IAM) Conditions, allowing organizations to restrict permissions based on context like request time, resource type and resource tags.

Who Touched My GCP Project? Understanding the Principal Part in Cloud Audit Logs – Part 2

This second part of the blog series continues the path to understanding principals and identities in Google Cloud Platform (GCP) Audit Logs. Part one introduced core concepts around GCP logging, the different identity types, service accounts, authentication methods, and impersonation.

Rippling Turning Into a Tsunami

In today’s digital workspace, SaaS applications like Slack, Google Drive, and Microsoft Teams have become the backbone of business communication and collaboration.

Uncovering Hidden Threats: Hunting Non-Human Identities in GitHub

In the last few days, two compromised GitHub Actions are actively leaking credentials, and a large-scale OAuth phishing campaign is exploiting developer trust.