Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action

Credit to Author: Sherrod DeGrippo| Date: Tue, 22 Oct 2024 16:00:00 +0000

Healthcare organizations are an attractive target for ransomware attacks. Read our latest blog post to learn why and get strategies to protect yourself from cyberthreats.​

The post Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action appeared first on Microsoft Security Blog.

Read more

New macOS vulnerability, “HM Surf”, could lead to unauthorized data access

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 17 Oct 2024 16:00:00 +0000

Microsoft Threat Intelligence uncovered a macOS vulnerability that could potentially allow an attacker to bypass the operating system’s Transparency, Consent, and Control (TCC) technology and gain unauthorized access to a user’s protected data. The vulnerability, which we refer to as “HM Surf”, involves removing the TCC protection for the Safari browser directory and modifying a […]

The post New macOS vulnerability, “HM Surf”, could lead to unauthorized data access appeared first on Microsoft Security Blog.

Read more

Escalating cyber threats demand stronger global defense and cooperation

Credit to Author: Tom Burt| Date: Tue, 15 Oct 2024 14:00:00 +0000

We must find a way to stem the tide of this malicious cyber activity. That includes continuing to harden our digital domains to protect our networks, data, and people at all levels. However, this challenge will not be accomplished solely by executing a checklist of cyber hygiene measures but only through a focus on and commitment to the foundations of cyber defense from the individual user to the corporate executive and to government leaders.  

The post Escalating cyber threats demand stronger global defense and cooperation appeared first on Microsoft Security Blog.

Read more

Microsoft’s guidance to help mitigate Kerberoasting  

Credit to Author: David Weston| Date: Fri, 11 Oct 2024 17:00:00 +0000

Kerberoasting, a well-known Active Directory (AD) attack vector, enables threat actors to steal credentials and navigate through devices and networks. Microsoft is sharing recommended actions administrators can take now to help prevent successful Kerberoasting cyberattacks.

The post Microsoft’s guidance to help mitigate Kerberoasting   appeared first on Microsoft Security Blog.

Read more

Microsoft Defender for Cloud remediated threats 30% faster than other solutions, according to Forrester TEI study

Credit to Author: Microsoft Security Team| Date: Mon, 07 Oct 2024 16:00:00 +0000

Forrester found that Microsoft Defender for Cloud markedly enhanced the security, compliance, and operational efficiency of each company participating.

The post Microsoft Defender for Cloud remediated threats 30% faster than other solutions, according to Forrester TEI study appeared first on Microsoft Security Blog.

Read more

​​Cyber Signals Issue 8 | Education under siege: How cybercriminals target our schools​​

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 10 Oct 2024 11:00:00 +0000

​This edition of Cyber Signals delves into the cybersecurity challenges facing classrooms and campuses, highlighting the critical need for robust defenses and proactive measures. From personal devices to virtual classes and research stored in the cloud, the digital footprint of school districts, colleges, and universities has multiplied exponentially.​

The post ​​Cyber Signals Issue 8 | Education under siege: How cybercriminals target our schools​​ appeared first on Microsoft Security Blog.

Read more

File hosting services misused for identity phishing

Credit to Author: Microsoft Threat Intelligence| Date: Tue, 08 Oct 2024 16:00:00 +0000

Since mid-April 2024, Microsoft has observed an increase in defense evasion tactics used in campaigns abusing file hosting services like SharePoint, OneDrive, and Dropbox. These campaigns use sophisticated techniques to perform social engineering, evade detection, and compromise identities, and include business email compromise (BEC) attacks.

The post File hosting services misused for identity phishing appeared first on Microsoft Security Blog.

Read more

Microsoft Defender for Cloud remediated threats 30% faster than other solutions, according to Forrester TEI™ study

Credit to Author: Microsoft Security Team| Date: Mon, 07 Oct 2024 16:00:00 +0000

Forrester found that Microsoft Defender for Cloud markedly enhanced the security, compliance, and operational efficiency of each company participating.

The post Microsoft Defender for Cloud remediated threats 30% faster than other solutions, according to Forrester TEI™ study appeared first on Microsoft Security Blog.

Read more

Cybersecurity Awareness Month: Securing our world—together

Credit to Author: Vasu Jakkal| Date: Tue, 01 Oct 2024 16:00:00 +0000

To help our global cyberdefenders, Microsoft has put together the Be Cybersmart Kit, designed to educate everyone, on best practices for going passwordless, not falling for sophisticated phishing or fraud, device protection, AI safety, and more.

The post Cybersecurity Awareness Month: Securing our world—together appeared first on Microsoft Security Blog.

Read more

Storm-0501: Ransomware attacks expanding to hybrid cloud environments

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 26 Sep 2024 17:00:00 +0000

Microsoft has observed the threat actor tracked as Storm-0501 launching a multi-staged attack where they compromised hybrid cloud environments and performed lateral movement from on-premises to cloud environment, leading to data exfiltration, credential theft, tampering, persistent backdoor access, and ransomware deployment. The said attack targeted multiple sectors in the United States, including government, manufacturing, transportation, […]

The post Storm-0501: Ransomware attacks expanding to hybrid cloud environments appeared first on Microsoft Security Blog.

Read more