Blog Posts

Research, Updates, Trends, Analysis
Stop Ransomware Attackers From Getting Paid to Play Double-Extortionware Games

In the past, many companies relied on backups to get back to business quickly if they were attacked. Reliable, secure backups separated from the primary environment made it much more difficult for an attacker to access and encrypt them. That long-standing process no longer deters double-extortionware actors — instead, today’s attackers not only encrypt the data but also exfiltrate it.

Are You Ready for a Slack Breach? 5 Ways to Minimize Potential Impact

As Slack becomes a dominant part of the infrastructure in your organization, it will become a target for attacks and at some point, it is likely to be breached (just like any other technology that we use). The impact of that breach, however, depends on how we prepare for it, by limiting its potential propagation and allowing for fast response.

How Identifying UserData Script Manipulation Accelerates Investigation

UserData script manipulation by threat actors is a technique that has been known in the wild for several years and has been observed being exploited by many attack groups, but monitoring and detecting malicious manipulation of user data script is not trivial with standard AWS Cloudtrail logging.

Get Ransomware-Ready – How to Protect Your Business Against Today’s Most Dangerous Cyberthreats

It is hard to overstate the level of havoc generated on global enterprises by year-over-year increases in ransomware attacks. We can point to any number of analyst findings to substantiate this position, but the latest Verizon Data Breach Investigations Report provides a credible, state-of-the-world snapshot.

Straight from the Mitiga RSAC booth: Your Cloud IR Planning Needs Readiness

Whether we were in the our exhibitor booth at RSA Conference, at the W Hotel for daily Happy Hour and Coffee Time socials, or in conversations following Thursday’s "It's Getting Real and Hitting the Fan! Real World Cloud Attacks” presentation by Ofer Maor, our co-founder and CTO, the energy was off the charts and the one-to-one exchanges rewarding. 

How Do You Successfully Deliver Management Training in a Hybrid World?

Over the last year we have had hyper growth at Mitiga — we went from 20 employees in the beginning of 2021, to 75 today. This growth created a new layer of team leads, many of whom were promoted internally into management roles.

Don’t Believe Incident Response is Different in the Cloud? Let Us Count the 9 Ways

Your organization may well have already realized the improved technological efficiencies and reduced overhead promises of cloud migration — regardless of whether that move was designed as a phased model involving discrete workloads or services, a larger-scale transition, or a strategy based on using a mix of cloud providers across multiple geographies.

Write DRY Go Code with Generics

Golang version 1.18 brought a shiny new feature — Generics. Go Generics is a programming style that is known and common in other high-level languages, including Python, Java, C#, and many more. Learn how to write DRY Go in generics

Join Mitiga at RSA Conference 2022 in San Francisco

Are you headed to the RSA Conference in San Francisco? I'm excited to be attending for the first time in quite a few years. It’s the first time many of us — attendees, exhibitors, speakers, and staff alike — are participating in a large-scale conference in person in two years. We’re hoping to make it fun and engaging for everyone we see at the conference. To do that, we have some plans...

Want to stay up to date on the latest Mitiga news and research? Subscribe to our blog!