Uncursing the ncurses: Memory corruption vulnerabilities found in library

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 14 Sep 2023 11:30:00 +0000

A set of memory corruption vulnerabilities in the ncurses library could have allowed attackers to chain the vulnerabilities to elevate privileges and run code in the targeted program’s context or perform other malicious actions.

The post Uncursing the ncurses: Memory corruption vulnerabilities found in library appeared first on Microsoft Security Blog.

Read more

Malware distributor Storm-0324 facilitates ransomware access

Credit to Author: Microsoft Threat Intelligence| Date: Tue, 12 Sep 2023 17:00:00 +0000

The threat actor that Microsoft tracks as Storm-0324 is a financially motivated group known to gain initial access using email-based initial infection vectors and then hand off access to compromised networks to other threat actors. These handoffs frequently lead to ransomware deployment. Beginning in July 2023, Storm-0324 was observed distributing payloads using an open-source tool […]

The post Malware distributor Storm-0324 facilitates ransomware access appeared first on Microsoft Security Blog.

Read more

Cloud storage security: What’s new in the threat matrix

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 07 Sep 2023 17:00:00 +0000

We’re announcing the release of a second version of our threat matrix for storage services, a structured tool that assists in identifying and analyzing potential security threats on data stored in cloud storage services.

The post Cloud storage security: What’s new in the threat matrix appeared first on Microsoft Security Blog.

Read more

Flax Typhoon using legitimate software to quietly access Taiwanese organizations

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 24 Aug 2023 16:30:00 +0000

China-based actor Flax Typhoon is exploiting known vulnerabilities for public-facing servers, legitimate VPN software, and open-source malware to gain access to Taiwanese organizations, but not taking further action.

The post Flax Typhoon using legitimate software to quietly access Taiwanese organizations appeared first on Microsoft Security Blog.

Read more

How the Microsoft Incident Response team helps customers remediate threats

Credit to Author: Microsoft Incident Response| Date: Tue, 15 Aug 2023 16:00:00 +0000

Microsoft Incident Response is a global team comprised of cybersecurity experts with deep, highly specialized knowledge in breach detection, response, and recovery.

The post How the Microsoft Incident Response team helps customers remediate threats appeared first on Microsoft Security Blog.

Read more

Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS 

Credit to Author: Microsoft Threat Intelligence| Date: Fri, 11 Aug 2023 00:00:00 +0000

Microsoft researchers identified multiple high-severity vulnerabilities in the CODESYS V3 SDK that could put operational technology (OT) infrastructure at risk of attacks, such as remote code execution (RCE) and denial of service (DoS).

The post Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS  appeared first on Microsoft Security Blog.

Read more

New Microsoft Security innovations expand multicloud visibility and enhance multiplatform protection

Credit to Author: Vasu Jakkal| Date: Wed, 09 Aug 2023 16:00:00 +0000

Gain greater visibility into your multicloud environments to better understand your security posture, minimize risk, and detect and respond to threats in real time.

The post New Microsoft Security innovations expand multicloud visibility and enhance multiplatform protection appeared first on Microsoft Security Blog.

Read more

Microsoft Purview data security mitigations for BazaCall and other human-operated data exfiltration attacks

Credit to Author: Steve Vandenberg| Date: Tue, 08 Aug 2023 17:00:00 +0000

Microsoft Defender is our toolset for prevention and mitigation of data exfiltration and ransomware attacks. Microsoft Purview data security offers important mitigations as well and should be used as part of a defense-in-depth strategy.

The post Microsoft Purview data security mitigations for BazaCall and other human-operated data exfiltration attacks appeared first on Microsoft Security Blog.

Read more

Boost identity protection with Axiad Cloud and Microsoft Entra ID

Credit to Author: Karen Larson| Date: Tue, 08 Aug 2023 16:00:00 +0000

As IT environments become more complex and multilayered to combat cybersecurity attacks, authentication processes for applications, operating systems, and workplace locations are increasingly managed in silos. Axiad Cloud and Microsoft Entra ID help to strengthen security perimeters by provisioning and managing phishing-resistant, passwordless credentials.

The post Boost identity protection with Axiad Cloud and Microsoft Entra ID appeared first on Microsoft Security Blog.

Read more