One Microsoft manager’s entrepreneurial vision for multicloud identity and access

Credit to Author: Christine Barrett| Date: Wed, 07 Sep 2022 16:00:00 +0000

Balaji Parimi, Partner General Manager of Permissions Management in the Identity and Network Access Division at Microsoft, discusses what his startup background brings to his work in identity and access management.

The post One Microsoft manager’s entrepreneurial vision for multicloud identity and access appeared first on Microsoft Security Blog.

Read more

Vulnerability in TikTok Android app could lead to one-click account hijacking

Credit to Author: Katie McCafferty| Date: Wed, 31 Aug 2022 16:00:00 +0000

Microsoft discovered a high-severity vulnerability in the TikTok Android application, now identified as CVE-2022-28799 and fixed by TikTok, which could have allowed attackers to compromise users’ accounts with a single click.

The post Vulnerability in TikTok Android app could lead to one-click account hijacking appeared first on Microsoft Security Blog.

Read more

Stop Ransomware with Microsoft Security digital event presents threat intelligence in action

Credit to Author: Christine Barrett| Date: Wed, 31 Aug 2022 13:00:00 +0000

Join the Stop Ransomware with Microsoft Security digital event on September 15, 2022, to learn how to safeguard your organization from today’s attacks—and be ready for tomorrow’s.

The post Stop Ransomware with Microsoft Security digital event presents threat intelligence in action appeared first on Microsoft Security Blog.

Read more

Cyber Signals: 3 strategies for protection against ransomware

Credit to Author: Christine Barrett| Date: Tue, 30 Aug 2022 15:00:00 +0000

New Cyber Signals shows more than 80 percent of ransomware attacks can be traced to common configuration errors. Here’s how we can get ahead of these attacks together as a cyber defender community.

The post Cyber Signals: 3 strategies for protection against ransomware appeared first on Microsoft Security Blog.

Read more

MERCURY leveraging Log4j 2 vulnerabilities in unpatched systems to target Israeli organizations

Credit to Author: Paul Oliveria| Date: Thu, 25 Aug 2022 16:00:00 +0000

Microsoft detected an Iran-based threat actor the Microsoft Threat Intelligence Center (MSTIC) tracks as MERCURY leveraging exploitation of Log4j 2 vulnerabilities in SysAid applications against organizations located in Israel.

The post MERCURY leveraging Log4j 2 vulnerabilities in unpatched systems to target Israeli organizations appeared first on Microsoft Security Blog.

Read more

Microsoft Security highlights from Black Hat USA 2022

Credit to Author: Christine Barrett| Date: Thu, 25 Aug 2022 16:00:00 +0000

Black Hat USA 2022 marked the twenty-fifth year that security researchers, security architects, and other security professionals have gathered to share the latest research, developments, and trends. Here are the highlights from the Microsoft Security booth.

The post Microsoft Security highlights from Black Hat USA 2022 appeared first on Microsoft Security Blog.

Read more

MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone

Credit to Author: Paul Oliveria| Date: Wed, 24 Aug 2022 17:00:00 +0000

Microsoft security researchers have discovered a post-compromise capability we’re calling MagicWeb, which is used by a threat actor we track as NOBELIUM to maintain persistent access to compromised environments.

The post MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone appeared first on Microsoft Security Blog.

Read more

Data governance: 5 tips for holistic data protection

Credit to Author: Christine Barrett| Date: Wed, 24 Aug 2022 16:00:00 +0000

Proactive data governance offers a holistic approach that conserves resources and simplifies the protection of your data assets. Microsoft Purview provides a comprehensive data governance solution designed to help manage your on-premises, multicloud, and software as a service (SaaS) data. Here are five ways it can help.

The post Data governance: 5 tips for holistic data protection appeared first on Microsoft Security Blog.

Read more

Looking for the ‘Sliver’ lining: Hunting for emerging command-and-control frameworks

Credit to Author: Paul Oliveria| Date: Wed, 24 Aug 2022 16:00:00 +0000

Threat actors evade detection by adopting the Sliver command-and-control (C2) framework in intrusion campaigns.

The post Looking for the ‘Sliver’ lining: Hunting for emerging command-and-control frameworks appeared first on Microsoft Security Blog.

Read more