Cryptojacking: Understanding and defending against cloud compute resource abuse

Credit to Author: Microsoft Threat Intelligence| Date: Tue, 25 Jul 2023 17:00:00 +0000

Cloud cryptojacking, a type of cyberattack that uses computing power to mine cryptocurrency, could result in financial loss to targeted organizations due to the compute fees that can be incurred from the abuse.

The post Cryptojacking: Understanding and defending against cloud compute resource abuse appeared first on Microsoft Security Blog.

Read more

New Microsoft identity and data security capabilities to accelerate CMMC compliance for the Defense Industrial Base

Credit to Author: Steve Faehl| Date: Mon, 24 Jul 2023 17:00:58 +0000

Microsoft introduces new capabilities in Microsoft Entra ID and Microsoft Purview that support CMMC compliance while also helping Defense Industrial Base organizations accelerate their Zero Trust journeys.

The post New Microsoft identity and data security capabilities to accelerate CMMC compliance for the Defense Industrial Base appeared first on Microsoft Security Blog.

Read more

Microsoft Defender Experts for XDR helps triage, investigate, and respond to cyberthreats

Credit to Author: Microsoft Security Experts| Date: Mon, 24 Jul 2023 16:00:00 +0000

Take a closer look at how Microsoft Defender Experts for XDR works, and how it complements the power of the Microsoft 365 Defender suite.

The post Microsoft Defender Experts for XDR helps triage, investigate, and respond to cyberthreats appeared first on Microsoft Security Blog.

Read more

​​Expanding cloud logging to give customers deeper security visibility

Credit to Author: Vasu Jakkal| Date: Wed, 19 Jul 2023 14:00:00 +0000

Today we are expanding Microsoft’s cloud logging accessibility and flexibility even further. Over the coming months, we will include access to wider cloud security logs for our worldwide customers at no additional cost.

The post ​​Expanding cloud logging to give customers deeper security visibility appeared first on Microsoft Security Blog.

Read more

Microsoft Inspire: Partner resources to prepare for the future of security with AI

Credit to Author: Vasu Jakkal and Alym Rayani| Date: Tue, 18 Jul 2023 15:30:00 +0000

Microsoft Inspire is an incredible opportunity to share all the ways AI can support security efforts with our partner ecosystem. Register to hear strategies to prepare your organization for AI with comprehensive security and security posture.

The post Microsoft Inspire: Partner resources to prepare for the future of security with AI appeared first on Microsoft Security Blog.

Read more

Storm-0978 attacks reveal financial and espionage motives

Credit to Author: Microsoft Threat Intelligence| Date: Tue, 11 Jul 2023 17:30:00 +0000

Microsoft has identified a phishing campaign conducted by the threat actor tracked as Storm-0978 targeting defense and government entities in Europe and North America. The campaign involved the abuse of CVE-2023-36884, which included a zero-day remote code execution vulnerability exploited via Microsoft Word documents.

The post Storm-0978 attacks reveal financial and espionage motives appeared first on Microsoft Security Blog.

Read more