Lessons Learned from WannaCry: Are We Ready for Another Global Attack?

Heading

Five years ago, the WannaCry ransomware cryptoworm targeted computers running Microsoft Windows, encrypting data at organizations around the world. The attackers demanded a ransom of just $300 worth of bitcoins within three days or the files would be permanently deleted. The cryptoworm leveraged the EternalBlue exploit, which the National Security Agency developed to attack older Windows Systems.

SaaS Breaches: How to Think about Security in Cloud Apps and Services

Heading

The Okta breach is yet another indication of what we have been seeing for the past few years in the cybersecurity industry, particularly in the incident response practice, demonstrating the increased sophistication and capabilities of various attack groups.

Cyber Resilience - Why & How to Start Building It In Your Organization

Heading

Cyber resilience is the ability of an organization or entity to continue to deliver services or solutions even in the face of adverse cyber events, such as cyberattacks. Cyber resilience combines elements of information security, business continuity, and organizational resilience.

Microsoft Storm-0558 SaaS Breach: Hunting for Stealth Espionage Attacks

Heading

Uncover the Microsoft Storm 0558 SaaS breach and learn expert strategies for hunting stealth espionage attacks and strengthening your security posture.

Hidden Dangers in the Cloud Control Plane | Mitiga

Heading

The cloud control plane can be difficult to understand. In this article we examine attack scenarios and how to harden your GCP environment. Learn more.

7 Best Practices for Cloud Incident Response

Heading

Regardless of the specific details of a breach, organizations must be prepared to respond when one occurs. The more organizations move applications and services to the cloud, the more it is important to plan for cloud incident response. These seven best practices will help you get started.

10 Recommendations for Your Organization to Increase Readiness Following the Okta Breach

Heading

We all woke up recently to a security nightmare. Okta, an industry leader in identity and access management is potentially breached and the impact for the industry may be very high. Here are 10 actionable recommendations you can share, but please let us know if you have more so that we can add them to this list.

Mitiga Cooperates with Law Enforcement on a Global BEC

Heading

Mitiga has worked with a law enforcement investigation to prevent criminals from impersonating Office 365 executives and redirecting wire transfers. Learn more.

What is the Spring4Shell exploit? An overview of the Spring vulnerability

Heading

Spring is a Java framework for dependency injection and Model-View-Controller (MVC) web development. Spring is a very popular framework; over 6,000 other libraries use the "spring-beans" library (according to Maven Central). Spring4Shell, a new exploit in Spring, was just disclosed.