Latest from the Labs
Explore the latest discoveries, deep dives, and technical how-tos from the Mitiga Labs team. Our research is dedicated to informing defenders and disrupting attackers.
Can vulnerabilities in on-prem resources reach my cloud environment?
Heading
What risk does this Zoho password manager vulnerability present, and could this on-prem vulnerability impact cloud environments as well?
Lacking readiness, massive Twitch.tv breach may be a win for competitors
Heading
What seems clear now is that Twitch simply wasn’t ready for an attack. Twitch claims that this latest incident was “a result of a server configuration change that allowed improper access by an unauthorized third party.”
Patches are not enough for VMWare vCenter Server and Cloud Foundation vulns
Heading
New vulnerabilities emerge and get published frequently, and merely applying patches is insufficient. Learn how to safeguard your data beyond just patching.
Rethinking Crown Jewels Analysis: Mitigating Cybersecurity Bias
Heading
Uncover the risks of bias in Crown Jewels Analysis (CJA) and learn strategies to protect your organization's most valuable assets with a comprehensive approach.
Security Advisory: Mitiga Recommends All AWS Customers Running Community AMIs to Verify Them for Malicious Code
Heading
Based on recent research and analysis, Mitiga issued a global advisory, warning AWS customers running EC2 instances based on Community AMIs (Amazon Machine Instances), from potentially embedded malicious code. We strongly advise verifying their security before continuing using these instances.
Mitiga Cooperates with Law Enforcement on a Global BEC
Heading
Mitiga has worked with a law enforcement investigation to prevent criminals from impersonating Office 365 executives and redirecting wire transfers. Learn more.
Step 1: Phish Mitiga. Step 2: Get Your Phishing-as-a-Platform Dissected by Mitiga
Heading
One of Mitiga’s employees received an email phishing for credentials. Instead of just laughing it off, our team decided to use their lunch breaks to analyze it. What we found indicates a sophisticated phishing platform that uses AWS and Oracle infrastructure to phish Office 365 email accounts.
4 Common Challenges Enterprises Face As They Move to the Cloud
Heading
Enterprises moving to the cloud from legacy data centers face many security challenges in making that transition, most notably the following four challenges.
How to Beat the Cubans in the Cuba Ransomware Gang
Heading
The Cuba Ransomware Gang is a group that hijacks information and blackmails companies to pay in Bitcoin or watch the private information leaked publicly.