5 cybersecurity capabilities announced at Microsoft Ignite 2022 to help you secure more with less

Credit to Author: Christine Barrett| Date: Wed, 12 Oct 2022 16:00:00 +0000

Microsoft Corporate Vice President, Compliance, Identity, and Management Vasu Jakkal shares five security strategies to protect your organization and do more with less.

The post 5 cybersecurity capabilities announced at Microsoft Ignite 2022 to help you secure more with less appeared first on Microsoft Security Blog.

Read more

Introducing new Microsoft Defender for Cloud innovations to strengthen cloud-native protections

Credit to Author: Christine Barrett| Date: Wed, 12 Oct 2022 16:00:00 +0000

Defenders are facing expanding attack surface areas and sophisticated threats compounded by insecure code that leaves the door open to attackers. To counter these threats we’re excited to announce new innovations in Microsoft Defender for Cloud to provide cloud-native application protection to strengthen security posture and mitigate risk from code to cloud.

The post Introducing new Microsoft Defender for Cloud innovations to strengthen cloud-native protections appeared first on Microsoft Security Blog.

Read more

Microsoft publishes new report on holistic insider risk management

Credit to Author: Christine Barrett| Date: Thu, 06 Oct 2022 16:00:00 +0000

The risk landscape for organizations has changed significantly in the past few years. Traditional ways of identifying and mitigating risks simply don’t work. Historically, organizations have focused on external threats; however, risks from within the organization can be just as prevalent and harmful. This new Microsoft-commissioned report lays out several new insights about how organizations go from a fragmented approach to insider risk management to a holistic one.

The post Microsoft publishes new report on holistic insider risk management appeared first on Microsoft Security Blog.

Read more

Detecting and preventing LSASS credential dumping attacks

Credit to Author: Paul Oliveria| Date: Wed, 05 Oct 2022 16:00:00 +0000

LSASS credential dumping is becoming prevalent, especially with the rise of human-operated ransomware. In May 2022, Microsoft participated in an evaluation conducted by AV-Comparatives specifically on detecting and blocking this attack technique and we’re happy to report that Microsoft Defender for Endpoint achieved 100% detection and prevention scores.

The post Detecting and preventing LSASS credential dumping attacks appeared first on Microsoft Security Blog.

Read more

Analyzing attacks using the Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082

Credit to Author: Katie McCafferty| Date: Sat, 01 Oct 2022 04:21:00 +0000

MSTIC observed activity related to a single activity group in August 2022 that achieved initial access and compromised Exchange servers by chaining CVE-2022-41040 and CVE-2022-41082 in a small number of targeted attacks.

The post Analyzing attacks using the Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082 appeared first on Microsoft Security Blog.

Read more

How one product manager builds community at Microsoft Security

Credit to Author: Christine Barrett| Date: Thu, 29 Sep 2022 17:00:00 +0000

In this interview, Principal Product Manager Joey Cruz explains how his military experience inspires his work protecting customers in identity and access management at Microsoft.

The post How one product manager builds community at Microsoft Security appeared first on Microsoft Security Blog.

Read more

CSO perspective: Why a strong IAM strategy is key to an organization’s cybersecurity approach

Credit to Author: Christine Barrett| Date: Thu, 29 Sep 2022 16:00:00 +0000

Mastercard Deputy Chief Security Officer Alissa “Dr. Jay” Abdullah, Ph.D., shares insights on why identity and access management is necessary and strategies for securing identities.

The post CSO perspective: Why a strong IAM strategy is key to an organization’s cybersecurity approach appeared first on Microsoft Security Blog.

Read more

ZINC weaponizing open-source software

Credit to Author: Katie McCafferty| Date: Thu, 29 Sep 2022 16:00:00 +0000

In recent months, Microsoft detected weaponization of legitimate open-source software by an actor the Microsoft Threat Intelligence Center (MSTIC) tracks as ZINC, targeting employees at media, defense and aerospace, and IT service provider organizations in the US, UK, India, and Russia.

The post ZINC weaponizing open-source software appeared first on Microsoft Security Blog.

Read more

Malicious OAuth applications abuse cloud email services to spread spam

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Thu, 22 Sep 2022 16:00:00 +0000

Microsoft discovered an attack where attackers installed a malicious OAuth application in compromised tenants and used their Exchange Online service to launch spam runs.

The post Malicious OAuth applications abuse cloud email services to spread spam appeared first on Microsoft Security Blog.

Read more