Iran’s cyber program has become one of the most active and aggressive nation-state threats today. From wiper malware and OT sabotage to disinformation and espionage campaigns, Iranian threat actors are targeting critical sectors across the globe, including finance, energy, healthcare, and government.

In this 30-minute live episode of Mitiga Mic, Brian Contos and a panel of experts will walk through the evolution of Iranian cyber capabilities, their key actors and tactics, and what’s changed since 2023, including insights from the recent Iran-Israel conflict and its spillover into U.S. infrastructure. We’ll unpack real-world examples, attack patterns, and actionable recommendations for defending against these threats.

If you're responsible for protecting cloud, enterprise, or critical infrastructure environments, this one is worth your time.

Join us live or recorded afterward on LinkedIn or YouTube.

LAST UPDATED:

June 18, 2025

Don't miss these stories:

Inside Mitiga’s Forensic Data Lake: Built for Real-World Cloud Investigations

Most security tools weren’t designed for the scale or complexity of cloud investigations. Mitiga’s Forensic Data Lake was.

Breaking Down the Microsoft Entra ID Actor Token Vulnerability: The Perfect Crime in the Cloud

When we think about catastrophic vulnerabilities in the cloud, we usually imagine complex exploits that require advanced techniques, persistence, or luck. Sometimes a single flaw breaks the trust we put in our identity providers.

Invisible Threats: Wireless Exploits in the Enterprise with Brett Walkenhorst

In this episode of Mitiga Mic, Field CISO Brian Contos talks with Brett Walkenhorst, CTO of Bastille, about how wireless attack techniques like Evil Twin and Nearest Neighbor are used to gain access to protected environments. They discuss how these threats show up inside data halls, executive spaces, and high-security facilities, often bypassing traditional network defenses

From Rogue OAuth App to Cloud Infrastructure Takeover

How a rogue OAuth app led to a full AWS environment takeover. And the key steps security leaders can take to prevent similar cloud breaches.

CORSLeak: Abusing IAP for Stealthy Data Exfiltration

When people talk about “highly restricted” cloud environments, they usually mean environments with no public IPs, no outbound internet, and strict VPC Service Controls locking everything down.

Defending SaaS & Cloud Workflows: Supply Chain Security Insights with Idan Cohen

From GitHub Actions to SaaS platforms, supply chain threats are growing. Hear Mitiga’s Idan Cohen and Field CISO Brian Contos explore real-world compromises, detection tips, and strategies to strengthen your cloud security.