Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity

Credit to Author: Paul Oliveria| Date: Thu, 27 Oct 2022 16:00:00 +0000

Microsoft has discovered recent activity indicating that the Raspberry Robin worm is part of a complex and interconnected malware ecosystem, with links to other malware families and alternate infection methods beyond its original USB drive spread.

The post Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity appeared first on Microsoft Security Blog.

Read more

How to prevent lateral movement attacks using Microsoft 365 Defender

Credit to Author: Christine Barrett| Date: Wed, 26 Oct 2022 16:00:00 +0000

Learn how Microsoft 365 Defender can enhance mitigations against lateral movement paths in your environment, stopping attackers from gaining access to privileged and sensitive accounts.

The post How to prevent lateral movement attacks using Microsoft 365 Defender appeared first on Microsoft Security Blog.

Read more

How businesses are gaining integrated data protection with Microsoft Purview

Credit to Author: Christine Barrett| Date: Tue, 25 Oct 2022 16:00:00 +0000

Learn how Rabobank, Fannie Mae, and Ernst & Young maximized their existing Microsoft 365 subscriptions to gain integrated data loss prevention and information protection.

The post How businesses are gaining integrated data protection with Microsoft Purview appeared first on Microsoft Security Blog.

Read more

DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector

Credit to Author: Katie McCafferty| Date: Tue, 25 Oct 2022 16:00:00 +0000

In recent months, Microsoft has detected active ransomware and extortion campaigns impacting the global education sector, particularly in the US, by a threat actor we track as DEV-0832, also known as Vice Society.

The post DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector appeared first on Microsoft Security Blog.

Read more

Securing IoT devices against attacks that target critical infrastructure

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Fri, 21 Oct 2022 16:00:00 +0000

South Staffordshire PLC, a company that supplies water to over one million customers in the United Kingdom, notified its customers in August of being a target of a criminal cyberattack. This incident highlights the sophisticated threats that critical industries face today.  According to South Staffordshire, the breach did not appear to have caused damage to…

The post Securing IoT devices against attacks that target critical infrastructure appeared first on Microsoft Security Blog.

Read more

Do more with less—Discover the latest Microsoft Entra innovations

Credit to Author: Christine Barrett| Date: Wed, 19 Oct 2022 16:00:00 +0000

In this economy, many organizations are looking for efficiencies. This is putting pressure on security teams, along with everyone else. For many, this means fewer resources to work with, even though cyberattacks continue to escalate. So, what do you do? You find ways to do more with less.

The post Do more with less—Discover the latest Microsoft Entra innovations appeared first on Microsoft Security Blog.

Read more

Defenders beware: A case for post-ransomware investigations

Credit to Author: Paul Oliveria| Date: Tue, 18 Oct 2022 18:00:00 +0000

The Microsoft Detection and Response Team (DART) details a recent ransomware incident in which the attacker used a collection of commodity tools and techniques, such as using living-off-the-land binaries, to launch their malicious code.

The post Defenders beware: A case for post-ransomware investigations appeared first on Microsoft Security Blog.

Read more

How Microsoft Purview and Priva help simplify data protection

Credit to Author: Christine Barrett| Date: Tue, 18 Oct 2022 16:00:00 +0000

Learn how Microsoft Purview and Microsoft Priva can help simplify data governance across your enterprise using the tools you already have—today.

The post How Microsoft Purview and Priva help simplify data protection appeared first on Microsoft Security Blog.

Read more

New “Prestige” ransomware impacts organizations in Ukraine and Poland

Credit to Author: Paul Oliveria| Date: Fri, 14 Oct 2022 19:00:00 +0000

The Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a novel ransomware campaign targeting organizations in the logistics and transportation industry in Ukraine and Poland utilizing a previously unidentified ransomware payload.

The post New “Prestige” ransomware impacts organizations in Ukraine and Poland appeared first on Microsoft Security Blog.

Read more

Microsoft named a Leader in the 2022 Gartner® Magic Quadrant™ for Security Information and Event Management

Credit to Author: Christine Barrett| Date: Thu, 13 Oct 2022 16:00:00 +0000

Microsoft named a Leader in the 2022 Gartner Magic Quadrant for security information and event management and is positioned highest on the measure of Ability to Execute and Completeness of Vision.

The post Microsoft named a Leader in the 2022 Gartner® Magic Quadrant™ for Security Information and Event Management appeared first on Microsoft Security Blog.

Read more