Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction

Credit to Author: Microsoft Incident Response and Microsoft Threat Intelligence| Date: Wed, 25 Oct 2023 16:30:00 +0000

Microsoft has been tracking activity related to the financially motivated threat actor Octo Tempest, whose evolving campaigns represent a growing concern for many organizations across multiple industries.

The post Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction appeared first on Microsoft Security Blog.

Read more

Top insights and best practices from the new Microsoft Data Security Index report

Credit to Author: Herain Oberoi| Date: Wed, 25 Oct 2023 16:00:00 +0000

Microsoft surveyed 800 cybersecurity professionals to gather their insights on data security. Read on for the top findings on data security strategies—and the value of a comprehensive cybersecurity solution.

The post Top insights and best practices from the new Microsoft Data Security Index report appeared first on Microsoft Security Blog.

Read more