Securing IoT devices against attacks that target critical infrastructure

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Fri, 21 Oct 2022 16:00:00 +0000

South Staffordshire PLC, a company that supplies water to over one million customers in the United Kingdom, notified its customers in August of being a target of a criminal cyberattack. This incident highlights the sophisticated threats that critical industries face today.  According to South Staffordshire, the breach did not appear to have caused damage to…

The post Securing IoT devices against attacks that target critical infrastructure appeared first on Microsoft Security Blog.

Read more

Do more with less—Discover the latest Microsoft Entra innovations

Credit to Author: Christine Barrett| Date: Wed, 19 Oct 2022 16:00:00 +0000

In this economy, many organizations are looking for efficiencies. This is putting pressure on security teams, along with everyone else. For many, this means fewer resources to work with, even though cyberattacks continue to escalate. So, what do you do? You find ways to do more with less.

The post Do more with less—Discover the latest Microsoft Entra innovations appeared first on Microsoft Security Blog.

Read more

Defenders beware: A case for post-ransomware investigations

Credit to Author: Paul Oliveria| Date: Tue, 18 Oct 2022 18:00:00 +0000

The Microsoft Detection and Response Team (DART) details a recent ransomware incident in which the attacker used a collection of commodity tools and techniques, such as using living-off-the-land binaries, to launch their malicious code.

The post Defenders beware: A case for post-ransomware investigations appeared first on Microsoft Security Blog.

Read more

How Microsoft Purview and Priva help simplify data protection

Credit to Author: Christine Barrett| Date: Tue, 18 Oct 2022 16:00:00 +0000

Learn how Microsoft Purview and Microsoft Priva can help simplify data governance across your enterprise using the tools you already have—today.

The post How Microsoft Purview and Priva help simplify data protection appeared first on Microsoft Security Blog.

Read more

New “Prestige” ransomware impacts organizations in Ukraine and Poland

Credit to Author: Paul Oliveria| Date: Fri, 14 Oct 2022 19:00:00 +0000

The Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a novel ransomware campaign targeting organizations in the logistics and transportation industry in Ukraine and Poland utilizing a previously unidentified ransomware payload.

The post New “Prestige” ransomware impacts organizations in Ukraine and Poland appeared first on Microsoft Security Blog.

Read more

Microsoft named a Leader in the 2022 Gartner® Magic Quadrant™ for Security Information and Event Management

Credit to Author: Christine Barrett| Date: Thu, 13 Oct 2022 16:00:00 +0000

Microsoft named a Leader in the 2022 Gartner Magic Quadrant for security information and event management and is positioned highest on the measure of Ability to Execute and Completeness of Vision.

The post Microsoft named a Leader in the 2022 Gartner® Magic Quadrant™ for Security Information and Event Management appeared first on Microsoft Security Blog.

Read more

5 cybersecurity capabilities announced at Microsoft Ignite 2022 to help you secure more with less

Credit to Author: Christine Barrett| Date: Wed, 12 Oct 2022 16:00:00 +0000

Microsoft Corporate Vice President, Compliance, Identity, and Management Vasu Jakkal shares five security strategies to protect your organization and do more with less.

The post 5 cybersecurity capabilities announced at Microsoft Ignite 2022 to help you secure more with less appeared first on Microsoft Security Blog.

Read more

Introducing new Microsoft Defender for Cloud innovations to strengthen cloud-native protections

Credit to Author: Christine Barrett| Date: Wed, 12 Oct 2022 16:00:00 +0000

Defenders are facing expanding attack surface areas and sophisticated threats compounded by insecure code that leaves the door open to attackers. To counter these threats we’re excited to announce new innovations in Microsoft Defender for Cloud to provide cloud-native application protection to strengthen security posture and mitigate risk from code to cloud.

The post Introducing new Microsoft Defender for Cloud innovations to strengthen cloud-native protections appeared first on Microsoft Security Blog.

Read more

Microsoft publishes new report on holistic insider risk management

Credit to Author: Christine Barrett| Date: Thu, 06 Oct 2022 16:00:00 +0000

The risk landscape for organizations has changed significantly in the past few years. Traditional ways of identifying and mitigating risks simply don’t work. Historically, organizations have focused on external threats; however, risks from within the organization can be just as prevalent and harmful. This new Microsoft-commissioned report lays out several new insights about how organizations go from a fragmented approach to insider risk management to a holistic one.

The post Microsoft publishes new report on holistic insider risk management appeared first on Microsoft Security Blog.

Read more

Detecting and preventing LSASS credential dumping attacks

Credit to Author: Paul Oliveria| Date: Wed, 05 Oct 2022 16:00:00 +0000

LSASS credential dumping is becoming prevalent, especially with the rise of human-operated ransomware. In May 2022, Microsoft participated in an evaluation conducted by AV-Comparatives specifically on detecting and blocking this attack technique and we’re happy to report that Microsoft Defender for Endpoint achieved 100% detection and prevention scores.

The post Detecting and preventing LSASS credential dumping attacks appeared first on Microsoft Security Blog.

Read more