Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&CK® matrix evaluation for defenders

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 11 May 2022 16:00:00 +0000

The Center for Threat-Informed Defense, along with Microsoft and industry partners, collaborated on a repeatable methodology and a web-based calculator, aiming to streamline MITRE ATT&CK® use for defenders.

The post Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&CK® matrix evaluation for defenders appeared first on Microsoft Security Blog.

Read more

Microsoft security experts outline next steps after compromise recovery

Credit to Author: Christine Barrett| Date: Tue, 10 May 2022 16:00:00 +0000

A compromise recovery, in general, means that we are implementing several years of work in cybersecurity in only six weeks. It is intense, and it changes how administrators work and how systems break. The main goals are to take back control, keep that control, and add this mindset to the customer.

The post Microsoft security experts outline next steps after compromise recovery appeared first on Microsoft Security Blog.

Read more

Building a safer world together with our partners—introducing Microsoft Security Experts

Credit to Author: Christine Barrett| Date: Mon, 09 May 2022 13:00:00 +0000

Technology alone is not enough to defend against cybercrime. It’s critical, but it’s the combination of leading technologies, comprehensive threat intelligence, and highly skilled people that makes for a truly effective security posture.

The post Building a safer world together with our partners—introducing Microsoft Security Experts appeared first on Microsoft Security Blog.

Read more

Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Mon, 09 May 2022 13:00:00 +0000

Microsoft coined the term “human-operated ransomware” to clearly define a class of attack driven by expert humane intelligence at every step of the attack chain and culminate in intentional business disruption and extortion. In this blog, we explain the ransomware-as-a-service affiliate model and disambiguate between the attacker tools and the various threat actors at play during a security incident.

The post Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself appeared first on Microsoft Security Blog.

Read more

How a senior product manager is leading the passwordless movement at Microsoft

Credit to Author: Christine Barrett| Date: Wed, 04 May 2022 16:00:00 +0000

May 5, 2022, is World Password Day, a day we all use to create awareness around password security. At Microsoft, we choose to celebrate replacing passwords with better and more secure ways to sign in. I can’t think of a better person at Microsoft to represent this journey than Libby Brown, a senior product manager…

The post How a senior product manager is leading the passwordless movement at Microsoft appeared first on Microsoft Security Blog.

Read more

Automating your Microsoft security suite with D3 XGEN SOAR  

Credit to Author: Christine Barrett| Date: Tue, 03 May 2022 16:00:00 +0000

Learn how D3 Security and Microsoft help customers overcome common security operations center pain points with D3 XGEN SOAR and Microsoft Sentinel.

The post Automating your Microsoft security suite with D3 XGEN SOAR   appeared first on Microsoft Security Blog.

Read more

Microsoft launches Defender for Business to help protect small and medium businesses

Credit to Author: Christine Barrett| Date: Mon, 02 May 2022 18:00:00 +0000

Microsoft Defender for Business is now available as a standalone solution to help small and medium businesses boost security as they face growing threats.

The post Microsoft launches Defender for Business to help protect small and medium businesses appeared first on Microsoft Security Blog.

Read more

How one senior developer brings the startup spirit to Microsoft

Credit to Author: Christine Barrett| Date: Wed, 27 Apr 2022 16:00:00 +0000

Igor Sakhnov, corporate vice president of Identity and Network Access Engineering, talks with software engineer George Maina about his entrepreneurial journey and the beginnings of the Microsoft Africa Development Center in Kenya.

The post How one senior developer brings the startup spirit to Microsoft appeared first on Microsoft Security Blog.

Read more

Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn

Credit to Author: Katie McCafferty| Date: Tue, 26 Apr 2022 16:00:00 +0000

Microsoft has discovered several vulnerabilities, collectively referred to as Nimbuspwn, that could be chained together, allowing an attacker to elevate privileges to root on many Linux desktop endpoints. Leveraging Nimbuspwn as a vector for root access could allow attackers to achieve greater impact on vulnerable devices by deploying payloads and performing other malicious actions via arbitrary root code execution.

The post Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn appeared first on Microsoft Security Blog.

Read more