The ultimate cybercriminal gift list: undisclosed zero-day vulnerabilities

Heading

Over the last few months, everyone has been busy patching — seeking to close the loophole most learned about when the a patch was released for Log4j 2.15.0 for Java 8 users to address the remote code execution vulnerability CVE-2021-44228, a previously undisclosed zero-day vulnerability.

Rethinking zero-day vulnerabilities vs. one-days to increase readiness

Heading

Because zero-day vulnerabilities are announced before security researchers and software developers have a patch available, zero-day vulnerabilities pose a critical risk to organizations as criminals race to exploit them. Similarly, vulnerable systems are exposed until a patch is issued and applied.

Rethinking Crown Jewels Analysis: Mitigating Cybersecurity Bias

Heading

Uncover the risks of bias in Crown Jewels Analysis (CJA) and learn strategies to protect your organization's most valuable assets with a comprehensive approach.

Log4Shell — Forensic Investigation in AWS

Heading

In order to mitigate the problems caused by Log4Shell, companies and organizations started patching their systems, but while everyone is busy "locking the doors," the criminals might already be inside. Mitiga is focused on content and research: finding efficient ways to look at artifacts on cloud environments and indicate if there is a reason to believe that the vulnerability has already been used to hack the environment.

Log4Shell - identify vulnerable external-facing workloads in AWS

Heading

Cloud-based systems should be thoroughly searched for the new Log4j vulnerability (CVE-2021-44228). But this is a daunting task, since you need to search each and every compute instance, from the biggest EC2 instance to the smallest Lambda function. This is where Mitiga can help.

Log4j Vulnerability Fix: Comprehensive Log4Shell Resources

Heading

Learn about the Log4j vulnerability, including resources, updates, and mitigation steps to protect your systems.

How to NOT pay ransomware and live to tell the tale

Heading

Ransomware is out of control. So, what can organizations actually do to deal with this tidal wave of attacks? It’s time for organizations to ask themselves the question, “Are we ransomware ready?” And then think about what ransomware readiness really looks like.

Can vulnerabilities in on-prem resources reach my cloud environment?

Heading

What risk does this Zoho password manager vulnerability present, and could this on-prem vulnerability impact cloud environments as well?

Lacking readiness, massive Twitch.tv breach may be a win for competitors

Heading

What seems clear now is that Twitch simply wasn’t ready for an attack. Twitch claims that this latest incident was “a result of a server configuration change that allowed improper access by an unauthorized third party.”