Financially motivated threat actors misusing App Installer

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 28 Dec 2023 18:00:00 +0000

Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, including financially motivated actors like Storm-0569, Storm-1113, Sangria Tempest, and Storm-1674, utilizing the ms-appinstaller URI scheme (App Installer) to distribute malware.

The post Financially motivated threat actors misusing App Installer appeared first on Microsoft Security Blog.

Read more

How Strata Identity and Microsoft Entra ID solve identity challenges in mergers and acquisitions

Credit to Author: Topher Marie| Date: Tue, 19 Dec 2023 17:00:00 +0000

Along with every merger and acquisition between two companies comes the need to combine and strengthen their IT infrastructure. There is an immediate and profound impact on the identity and access management postures of both companies. Learn how to protect your organization with Strata Identity and Microsoft Entra ID.

The post How Strata Identity and Microsoft Entra ID solve identity challenges in mergers and acquisitions appeared first on Microsoft Security Blog.

Read more

Patching Perforce perforations: Critical RCE vulnerability discovered in Perforce Helix Core Server

Credit to Author: Microsoft Threat Intelligence| Date: Fri, 15 Dec 2023 17:00:00 +0000

Four new unauthenticated remotely exploitable security vulnerabilities discovered in the popular source code management platform Perforce Helix Core Server have been remediated after being responsibly disclosed by Microsoft. Perforce Server customers are strongly urged to update to version 2023.1/2513900.

The post Patching Perforce perforations: Critical RCE vulnerability discovered in Perforce Helix Core Server appeared first on Microsoft Security Blog.

Read more

Threat actors misuse OAuth applications to automate financially driven attacks

Credit to Author: Microsoft Threat Intelligence| Date: Tue, 12 Dec 2023 18:00:00 +0000

Microsoft Threat Intelligence presents cases of threat actors misusing OAuth applications as automation tools in financially motivated attacks.

The post Threat actors misuse OAuth applications to automate financially driven attacks appeared first on Microsoft Security Blog.

Read more

New Microsoft Incident Response team guide shares best practices for security teams and leaders

Credit to Author: Microsoft Incident Response| Date: Mon, 11 Dec 2023 17:00:00 +0000

The Microsoft Incident Response team shares a downloadable, interactive, people-centric, guide to effective incident response.

The post New Microsoft Incident Response team guide shares best practices for security teams and leaders appeared first on Microsoft Security Blog.

Read more