Can vulnerabilities in on-prem resources reach my cloud environment?

Heading

What risk does this Zoho password manager vulnerability present, and could this on-prem vulnerability impact cloud environments as well?

Lacking readiness, massive Twitch.tv breach may be a win for competitors

Heading

What seems clear now is that Twitch simply wasn’t ready for an attack. Twitch claims that this latest incident was “a result of a server configuration change that allowed improper access by an unauthorized third party.”

Patches are not enough for VMWare vCenter Server and Cloud Foundation vulns

Heading

New vulnerabilities emerge and get published frequently, and merely applying patches is insufficient. Learn how to safeguard your data beyond just patching.

Rethinking Crown Jewels Analysis: Mitigating Cybersecurity Bias

Heading

Uncover the risks of bias in Crown Jewels Analysis (CJA) and learn strategies to protect your organization's most valuable assets with a comprehensive approach.

Security Advisory: Mitiga Recommends All AWS Customers Running Community AMIs to Verify Them for Malicious Code

Heading

Based on recent research and analysis, Mitiga issued a global advisory, warning AWS customers running EC2 instances based on Community AMIs (Amazon Machine Instances), from potentially embedded malicious code. We strongly advise verifying their security before continuing using these instances.

Mitiga Cooperates with Law Enforcement on a Global BEC

Heading

Mitiga has worked with a law enforcement investigation to prevent criminals from impersonating Office 365 executives and redirecting wire transfers. Learn more.

Step 1: Phish Mitiga. Step 2: Get Your Phishing-as-a-Platform Dissected by Mitiga

Heading

One of Mitiga’s employees received an email phishing for credentials. Instead of just laughing it off, our team decided to use their lunch breaks to analyze it. What we found indicates a sophisticated phishing platform that uses AWS and Oracle infrastructure to phish Office 365 email accounts.

4 Common Challenges Enterprises Face As They Move to the Cloud

Heading

Enterprises moving to the cloud from legacy data centers face many security challenges in making that transition, most notably the following four challenges.

How to Beat the Cubans in the Cuba Ransomware Gang

Heading

The Cuba Ransomware Gang is a group that hijacks information and blackmails companies to pay in Bitcoin or watch the private information leaked publicly.