More cyberattackers are targeting organizations' cloud environments, but some cloud services, such as Google Cloud Platform's storage, fail to create adequate logs for forensics.
In this Entrepreneur's Handbook episode, CEO and Co-Founder Tal Mozes talks with Amardeep Parmar, describing how Mitiga helps customers recover over 90% faster from cloud and SaaS breaches, proactive Threat Hunts, and much more.
This Dark Reading Tech Tip outlines the steps enterprise defenders should take as they protect their data in cloud environments in response to the security incident with the CI/CD platform, referencing Mitiga's CircleCI Cybersecurity Incident Hunting Guide.
As researchers from security firm Mitiga emphasized, “rotating” any and all secrets stored in CircleCI is not enough. Users will have to hunt for malicious actions in all of your integrated SaaS and cloud platforms to ensure you haven’t been breached on these other platforms, as well.
Following the CircleCI security breach, Mitiga published a technical blog highlighting the potential impact and offering further guidance on how organizations can detect malicious activities comprehensively across third-party applications.
Devops Engineer Stav Ochakovski published a blog on Medium that focuses on how Mitiga recently shifted to a single monorepo — one source of truth for all of our code.
Mitiga has said a new AWS feature has led to a vulnerability that could allow hackers to access and steal Elastic IP addresses and gain control over AWS accounts. Mitiga notified the AWS security team about its findings before publishing and incorporated the feedback it got as part of its post.
Infosecurity UK covers Mitiga's Threat Research into AWS Elastic IP, as well as how organizations can detect and respond to EIP Transfers.
Mitiga Vice President of Consulting Rob Floodeen recently identified the characteristics of voice phishing ("vishing") attacks with UK media outlet Raconteur.