Latest from the Labs
Explore the latest discoveries, deep dives, and technical how-tos from the Mitiga Labs team. Our research is dedicated to informing defenders and disrupting attackers.
10 Recommendations for Your Organization to Increase Readiness Following the Okta Breach
Heading
We all woke up recently to a security nightmare. Okta, an industry leader in identity and access management is potentially breached and the impact for the industry may be very high. Here are 10 actionable recommendations you can share, but please let us know if you have more so that we can add them to this list.
Ready or Not: Russian Attack on Ukraine Brings Global Cybersecurity Impacts
Heading
The Russian military strategy is often described as a strategy of “active defense.” This means that their strategy includes both the preventative measures taken before a conflict breaks out and the tenets for conducting the war.
Here's Why Traditional Incident Response Doesn’t Work in the Cloud
Heading
Traditional incident response (IR) learned from on-premises investigations doesn’t work in the cloud. Today's threat actors are finding misconfigurations and vulnerabilities to allow them to penetrate cloud environments.
Understanding Lateral Movement Attacks in Hybrid Environments
Heading
Learn how lateral movement attacks pose serious risks in on-prem, cloud, or hybrid environments, and discover effective strategies to mitigate these threats.
The ultimate cybercriminal gift list: undisclosed zero-day vulnerabilities
Heading
Over the last few months, everyone has been busy patching — seeking to close the loophole most learned about when the a patch was released for Log4j 2.15.0 for Java 8 users to address the remote code execution vulnerability CVE-2021-44228, a previously undisclosed zero-day vulnerability.
Rethinking zero-day vulnerabilities vs. one-days to increase readiness
Heading
Because zero-day vulnerabilities are announced before security researchers and software developers have a patch available, zero-day vulnerabilities pose a critical risk to organizations as criminals race to exploit them. Similarly, vulnerable systems are exposed until a patch is issued and applied.
Log4Shell - identify vulnerable external-facing workloads in AWS
Heading
Cloud-based systems should be thoroughly searched for the new Log4j vulnerability (CVE-2021-44228). But this is a daunting task, since you need to search each and every compute instance, from the biggest EC2 instance to the smallest Lambda function. This is where Mitiga can help.
Log4j Vulnerability Fix: Comprehensive Log4Shell Resources
Heading
Learn about the Log4j vulnerability, including resources, updates, and mitigation steps to protect your systems.
How to NOT pay ransomware and live to tell the tale
Heading
Ransomware is out of control. So, what can organizations actually do to deal with this tidal wave of attacks? It’s time for organizations to ask themselves the question, “Are we ransomware ready?” And then think about what ransomware readiness really looks like.