New security features in Windows 11 protect users and empower IT

Credit to Author: David Weston| Date: Tue, 26 Sep 2023 17:00:00 +0000

Windows 11 is designed to simplify security with features from the chip to the cloud that are on by default. Since its launch, we’ve seen a 58 percent reduction in security. Learn more about the new features.

The post New security features in Windows 11 protect users and empower IT appeared first on Microsoft Security Blog.

Read more

Microsoft 365 Defender demonstrates 100 percent protection coverage in the 2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise 

Credit to Author: Tanmay Ganacharya| Date: Wed, 20 Sep 2023 13:00:00 +0000

​For the fifth consecutive year, Microsoft 365 Defender demonstrated leading extended detection and response (XDR) capabilities in the independent MITRE Engenuity ATT&CK® Evaluations: Enterprise. The attack used during the test highlights the importance of a unified XDR platform and showcases Microsoft 365 Defender as a leading solution, enabled by next-gen protection, industry-first capabilities like automatic attack disruption, and more.

The post Microsoft 365 Defender demonstrates 100 percent protection coverage in the 2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise  appeared first on Microsoft Security Blog.

Read more

Forrester names Microsoft a Leader in the 2023 Zero Trust Platform Providers Wave™ report

Credit to Author: Joy Chik| Date: Tue, 19 Sep 2023 16:00:00 +0000

Microsoft is proud to be recognized as a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023 report.

The post Forrester names Microsoft a Leader in the 2023 Zero Trust Platform Providers Wave™ report appeared first on Microsoft Security Blog.

Read more

Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 14 Sep 2023 16:30:00 +0000

Since February 2023, Microsoft has observed a high volume of password spray attacks attributed to Peach Sandstorm, an Iranian nation-state group. In a small number of cases, Peach Sandstorm successfully authenticated to an account and used a combination of publicly available and custom tools for persistence, lateral movement, and exfiltration.

The post Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets appeared first on Microsoft Security Blog.

Read more

Uncursing the ncurses: Memory corruption vulnerabilities found in library

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 14 Sep 2023 11:30:00 +0000

A set of memory corruption vulnerabilities in the ncurses library could have allowed attackers to chain the vulnerabilities to elevate privileges and run code in the targeted program’s context or perform other malicious actions.

The post Uncursing the ncurses: Memory corruption vulnerabilities found in library appeared first on Microsoft Security Blog.

Read more

Malware distributor Storm-0324 facilitates ransomware access

Credit to Author: Microsoft Threat Intelligence| Date: Tue, 12 Sep 2023 17:00:00 +0000

The threat actor that Microsoft tracks as Storm-0324 is a financially motivated group known to gain initial access using email-based initial infection vectors and then hand off access to compromised networks to other threat actors. These handoffs frequently lead to ransomware deployment. Beginning in July 2023, Storm-0324 was observed distributing payloads using an open-source tool […]

The post Malware distributor Storm-0324 facilitates ransomware access appeared first on Microsoft Security Blog.

Read more

Cloud storage security: What’s new in the threat matrix

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 07 Sep 2023 17:00:00 +0000

We’re announcing the release of a second version of our threat matrix for storage services, a structured tool that assists in identifying and analyzing potential security threats on data stored in cloud storage services.

The post Cloud storage security: What’s new in the threat matrix appeared first on Microsoft Security Blog.

Read more

Flax Typhoon using legitimate software to quietly access Taiwanese organizations

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 24 Aug 2023 16:30:00 +0000

China-based actor Flax Typhoon is exploiting known vulnerabilities for public-facing servers, legitimate VPN software, and open-source malware to gain access to Taiwanese organizations, but not taking further action.

The post Flax Typhoon using legitimate software to quietly access Taiwanese organizations appeared first on Microsoft Security Blog.

Read more