Gatekeeper’s Achilles heel: Unearthing a macOS vulnerability

Credit to Author: Microsoft Security Threat Intelligence| Date: Mon, 19 Dec 2022 18:00:00 +0000

Microsoft discovered a vulnerability in macOS, referred to as “Achilles”, allowing attackers to bypass application execution restrictions enforced by the Gatekeeper security mechanism.

The post Gatekeeper’s Achilles heel: Unearthing a macOS vulnerability appeared first on Microsoft Security Blog.

Read more

Forrester names Microsoft a Leader in Q4 2022 Security Analytics Platforms Wave report

Credit to Author: Christine Barrett| Date: Mon, 19 Dec 2022 17:00:00 +0000

We’re excited to announce that Microsoft is named a Leader in the 2022 Forrester Wave™: Security Analytics Platforms. Microsoft achieved the highest possible score in 17 different criteria, including partner ecosystem, innovation roadmap, product security, case management, and architecture.

The post Forrester names Microsoft a Leader in Q4 2022 Security Analytics Platforms Wave report appeared first on Microsoft Security Blog.

Read more

MCCrash: Cross-platform DDoS botnet targets private Minecraft servers

Credit to Author: Paul Oliveria| Date: Thu, 15 Dec 2022 18:00:00 +0000

The Microsoft Defender for IoT research team analyzed a cross-platform botnet that infects both Windows and Linux systems from PCs to IoT devices, to launch distributed denial of service (DDoS) attacks against private Minecraft servers.

The post MCCrash: Cross-platform DDoS botnet targets private Minecraft servers appeared first on Microsoft Security Blog.

Read more

Do more with less with Microsoft Security—3 strategies to get you started

Credit to Author: Christine Barrett| Date: Thu, 15 Dec 2022 17:00:00 +0000

Microsoft Corporate Vice President of Compliance, Identity, and Management Vasu Jakkal explores what it means to do more with less in your security approach.

The post Do more with less with Microsoft Security—3 strategies to get you started appeared first on Microsoft Security Blog.

Read more

Cyber Signals: Risks to critical infrastructure on the rise

Credit to Author: Emma Jones| Date: Wed, 14 Dec 2022 12:30:00 +0000

Today, the third edition of Cyber Signals was released spotlighting security trends and insights gathered from Microsoft’s 43 trillion daily security signals and 8,500 security experts.

The post Cyber Signals: Risks to critical infrastructure on the rise appeared first on Microsoft Security Blog.

Read more

4 things to look for in a multicloud data protection solution

Credit to Author: Emma Jones| Date: Tue, 13 Dec 2022 17:00:00 +0000

Learn four must-haves for multicloud data protection, including how an integrated solution provides greater scalability and protection across your multicloud and hybrid environment.

The post 4 things to look for in a multicloud data protection solution appeared first on Microsoft Security Blog.

Read more

IIS modules: The evolution of web shells and how to detect them 

Credit to Author: Microsoft Security Threat Intelligence – Editor| Date: Mon, 12 Dec 2022 17:00:00 +0000

This blog aims to provide further guidance on detecting malicious IIS modules and other capabilities that you can use during your own incident response investigations.

The post IIS modules: The evolution of web shells and how to detect them  appeared first on Microsoft Security Blog.

Read more

Mitigate threats with the new threat matrix for Kubernetes

Credit to Author: Microsoft Security Threat Intelligence| Date: Wed, 07 Dec 2022 17:00:00 +0000

The updated threat matrix for Kubernetes comes in a new format that simplifies usage of the knowledge base and with new content to help mitigate threats.

The post Mitigate threats with the new threat matrix for Kubernetes appeared first on Microsoft Security Blog.

Read more

DEV-0139 launches targeted attacks against the cryptocurrency industry

Credit to Author: Katie McCafferty| Date: Tue, 06 Dec 2022 17:00:00 +0000

Microsoft security researchers investigate an attack where the threat actor, tracked DEV-0139, used chat groups to target specific cryptocurrency investment companies and run a backdoor within their network.

The post DEV-0139 launches targeted attacks against the cryptocurrency industry appeared first on Microsoft Security Blog.

Read more

Implementing Zero Trust access to business data on BYOD with Trustd MTD and Microsoft Entra

Credit to Author: Christine Barrett| Date: Wed, 30 Nov 2022 17:00:00 +0000

Protect business data—and employee privacy—with conditional access on employees’ personal devices with Trustd MTD and Microsoft Entra.

The post Implementing Zero Trust access to business data on BYOD with Trustd MTD and Microsoft Entra appeared first on Microsoft Security Blog.

Read more