US Government sets forth Zero Trust architecture strategy and requirements

Credit to Author: Emma Jones| Date: Thu, 17 Feb 2022 18:00:00 +0000

To help protect the United States from increasingly sophisticated cyber threats, the White House issued Executive Order 14028 on Improving the Nation’s Cybersecurity, requiring US Federal Government organizations to take action to strengthen national cybersecurity.

The post US Government sets forth Zero Trust architecture strategy and requirements appeared first on Microsoft Security Blog.

Read more

‘Ice phishing’ on the blockchain

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 16 Feb 2022 17:00:00 +0000

Our recent analysis of a phishing attack connected to the blockchain reaffirms the durability of threats like social engineering, as well as the need for security fundamentals to be built into related future systems and frameworks.

The post ‘Ice phishing’ on the blockchain appeared first on Microsoft Security Blog.

Read more

What’s Next in Security from Microsoft

Credit to Author: Pooja Parab| Date: Thu, 10 Feb 2022 17:00:00 +0000

On February 24, 2022, at the What’s Next in Security from Microsoft digital event, you’ll learn how a comprehensive approach to security will give you the confidence to take appropriate business risks that move your company forward. At this event, Vasu Jakkal, Microsoft Corporate Vice President of Security, Compliance, and Identity, and other security experts will share exciting new innovations that help reduce the risk from the latest threats.

The post What’s Next in Security from Microsoft appeared first on Microsoft Security Blog.

Read more

Cybersecurity threats are always changing—staying on top of them is vital, getting ahead of them is paramount

Credit to Author: Pooja Parab| Date: Wed, 09 Feb 2022 20:00:00 +0000

Monitoring and gaining insights from over 24 trillion signals daily, Microsoft Security and industry leaders provide expert guidance and insights on cyber threats and trends.

The post Cybersecurity threats are always changing—staying on top of them is vital, getting ahead of them is paramount appeared first on Microsoft Security Blog.

Read more

Detect active network reconnaissance with Microsoft Defender for Endpoint

Credit to Author: Pooja Parab| Date: Mon, 07 Feb 2022 17:00:00 +0000

Active network reconnaissance is a critical component of the cybersecurity kill chain allowing for network topography and endpoint services to be mapped and used in targeted campaigns. Microsoft Defender for Endpoint can help to detect and disrupt these attacks at the earliest stages, providing our defenders with a powerful tool to gain visibility, take appropriate action and mitigate the risk of endpoint exploitation.

The post Detect active network reconnaissance with Microsoft Defender for Endpoint appeared first on Microsoft Security Blog.

Read more

ACTINIUM targets Ukrainian organizations

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Fri, 04 Feb 2022 18:00:00 +0000

The Microsoft Threat Intelligence Center (MSTIC) is sharing information on a threat group named ACTINIUM, which has been operational for almost a decade and has consistently pursued access to organizations in Ukraine or entities related to Ukrainian affairs. MSTIC previously tracked ACTINIUM activity as DEV-0157, and this group is also referred to publicly as Gamaredon.…

The post ACTINIUM targets Ukrainian organizations appeared first on Microsoft Security Blog.

Read more

Cyber Signals: Defending against cyber threats with the latest research, insights, and trends

Credit to Author: Emma Jones| Date: Thu, 03 Feb 2022 14:00:00 +0000

We’re excited to introduce Cyber Signals, a cyber threat intelligence brief informed by the latest Microsoft threat data and research. This content, which will be released quarterly, offers an expert perspective into the current threat landscape, discussing trending tactics, techniques, and strategies used by the world’s most prolific threat actors.

The post Cyber Signals: Defending against cyber threats with the latest research, insights, and trends appeared first on Microsoft Security Blog.

Read more

The evolution of a Mac trojan: UpdateAgent’s progression

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 02 Feb 2022 17:00:00 +0000

Our discovery and analysis of a sophisticated Mac trojan in October exposed a year-long evolution of a malware family—and depicts the rising complexity of threats across platforms.

The post The evolution of a Mac trojan: UpdateAgent’s progression appeared first on Microsoft Security Blog.

Read more

Gartner® names Microsoft a Leader in the 2022 Magic Quadrant™ for Enterprise Information Archiving

Credit to Author: Emma Jones| Date: Fri, 28 Jan 2022 18:00:00 +0000

We are honored that Gartner has listed Microsoft as a Leader in its 2022 Magic Quadrant for Enterprise Information Archiving in recognition of our ability to execute and completeness of vision. This is the fourth consecutive year that Gartner recognized Microsoft as a Leader in this critical space.

The post Gartner® names Microsoft a Leader in the 2022 Magic Quadrant™ for Enterprise Information Archiving appeared first on Microsoft Security Blog.

Read more