New Star Blizzard spear-phishing campaign targets WhatsApp accounts

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 16 Jan 2025 17:00:00 +0000

In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we track as Star Blizzard sending their typical targets spear-phishing messages, this time offering the supposed opportunity to join a WhatsApp group. This is the first time we have identified a shift in Star Blizzard’s longstanding tactics, techniques, and procedures (TTPs) to leverage a […]

The post New Star Blizzard spear-phishing campaign targets WhatsApp accounts appeared first on Microsoft Security Blog.

Read more

Innovating in line with the European Union’s AI Act 

Credit to Author: Natasha Crampton| Date: Wed, 15 Jan 2025 14:10:00 +0000

As our Microsoft AI Tour reached Brussels, Paris, and Berlin recently, we met with European organizations that were energized by the possibilities of our latest AI technologies and engaged in deployment projects. They were also alert to the fact that 2025 is the year that key obligations under the European Union’s AI Act come into effect, opening a new chapter in digital regulation as the world’s first, comprehensive AI law becomes a reality.

The post Innovating in line with the European Union’s AI Act  appeared first on Microsoft Security Blog.

Read more

Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions

Credit to Author: Microsoft Threat Intelligence| Date: Mon, 13 Jan 2025 17:00:00 +0000

Microsoft discovered a macOS vulnerability allowing attackers to bypass System Integrity Protection (SIP) by loading third party kernel extensions, which could lead to serious consequences, such as allowing attackers to install rootkits, create persistent malware, bypass Transparency, Consent, and Control (TCC), and expand the attack surface to perform other unauthorized operations.

The post Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions appeared first on Microsoft Security Blog.

Read more

3 takeaways from red teaming 100 generative AI products

Credit to Author: Blake Bullwinkel and Ram Shankar Siva Kumar| Date: Mon, 13 Jan 2025 16:00:00 +0000

Since 2018, Microsoft’s AI Red Team has probed generative AI products for critical safety and security vulnerabilities. Read our latest blog for three lessons we’ve learned along the way.

The post 3 takeaways from red teaming 100 generative AI products appeared first on Microsoft Security Blog.

Read more

Why security teams rely on Microsoft Defender Experts for XDR for managed detection and response

Credit to Author: Microsoft Security Experts| Date: Mon, 06 Jan 2025 17:00:00 +0000

Microsoft Defender Experts for XDR is a mature and proven service that triages, investigates, and responds to incidents and hunts for threats on a customer’s behalf around the clock. Learn more about why organizations across major industries rely on it.

The post Why security teams rely on Microsoft Defender Experts for XDR for managed detection and response appeared first on Microsoft Security Blog.

Read more

New Microsoft guidance for the CISA Zero Trust Maturity Model

Credit to Author: Steve Faehl| Date: Thu, 19 Dec 2024 17:00:00 +0000

New Microsoft guidance is now available for United States government agencies and their industry partners to help implement Zero Trust strategies and meet CISA Zero Trust requirements.

The post New Microsoft guidance for the CISA Zero Trust Maturity Model appeared first on Microsoft Security Blog.

Read more

Foundry study highlights the benefits of a unified security platform in new e-book

Credit to Author: Rob Lefferts| Date: Wed, 18 Dec 2024 17:00:00 +0000

Microsoft commissioned Foundry to conduct a study to understand the current state of threat protection. Read the new e-book for research-driven insights into a unified security platform.

The post Foundry study highlights the benefits of a unified security platform in new e-book appeared first on Microsoft Security Blog.

Read more

Microsoft Defender for Cloud named a Leader in Frost Radar™ for CNAPP for the second year in a row! 

Credit to Author: Mona Thaker| Date: Tue, 17 Dec 2024 17:00:00 +0000

In the ever-evolving landscape of cloud security, Microsoft continues to assert its dominance with its comprehensive and innovative solutions. The Frost Radar™: Cloud-Native Application Protection Platforms, 2024 report underscores Microsoft’s leadership in both – the innovation and growth index, highlighting several key strengths that set it apart from the competition.  Frost and Sullivan states in […]

The post Microsoft Defender for Cloud named a Leader in Frost Radar™ for CNAPP for the second year in a row!  appeared first on Microsoft Security Blog.

Read more

Convincing a billion users to love passkeys: UX design insights from Microsoft to boost adoption and security

Credit to Author: Sangeeta Ranjit and Scott Bingham| Date: Thu, 12 Dec 2024 17:00:00 +0000

Passkeys offer faster, safer sign-ins than passwords. Microsoft encourages users to adopt passkeys for improved security and convenience.

The post Convincing a billion users to love passkeys: UX design insights from Microsoft to boost adoption and security appeared first on Microsoft Security Blog.

Read more