Destructive malware targeting Ukrainian organizations

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Sun, 16 Jan 2022 02:28:30 +0000

Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple organizations in Ukraine.

The post Destructive malware targeting Ukrainian organizations appeared first on Microsoft Security Blog.

Read more

Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks

Credit to Author: Eric Avena| Date: Tue, 17 Mar 2020 16:00:49 +0000

Secured-core PCs combine virtualization, operating system, and hardware and firmware protection. Along with Microsoft Defender ATP, Secured-core PCs provide end-to-end protection against advanced attacks that leverage driver vulnerabilities to gain kernel privileges.

The post Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks appeared first on Microsoft Security.

Read more

Behavioral blocking and containment: Transforming optics into protection

Credit to Author: Eric Avena| Date: Mon, 09 Mar 2020 16:30:20 +0000

Behavioral blocking and containment capabilities leverage multiple Microsoft Defender ATP components and features to immediately stop attacks before they can progress. We have expanded these capabilities to get even broader visibility into malicious behavior by using a rapid protection loop engine that leverages endpoint and detection response (EDR) sensors.

The post Behavioral blocking and containment: Transforming optics into protection appeared first on Microsoft Security.

Read more

Human-operated ransomware attacks: A preventable disaster

Credit to Author: Eric Avena| Date: Thu, 05 Mar 2020 17:00:31 +0000

In human-operated ransomware attacks, adversaries exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.

The post Human-operated ransomware attacks: A preventable disaster appeared first on Microsoft Security.

Read more

Quick wins—single sign-on (SSO) and Multi-Factor Authentication (MFA)

Credit to Author: Todd VanderArk| Date: Tue, 03 Mar 2020 17:00:09 +0000

Organizations should consider a Cloud Identity as a Service (IDaaS), and MFA solution, like Azure Active Directory (Azure AD) for effective countermeasures against modern threats.

The post Quick wins—single sign-on (SSO) and Multi-Factor Authentication (MFA) appeared first on Microsoft Security.

Read more

CVE-2020-0796 – A “wormable” Remote Code Execution vulnerability in SMB v3

Credit to Author: Quickheal| Date: Fri, 13 Mar 2020 03:08:36 +0000

Since last two days, the Internet is rife with news around a critical remote code execution vulnerability in SMBv3.1.1 compression mechanism. Today, on 12th March 2020 Microsoft has released an emergency out-of-band patch to address this vulnerability. As per Microsoft release information, it’s a remote code execution vulnerability in the…

Read more

Can playing video games on the PC cause cyberattacks?

Credit to Author: Quickheal| Date: Thu, 12 Mar 2020 11:00:37 +0000

The video gaming industry has become the foremost entertainment medium worldwide as evidenced by its valuation. The market is estimated to reach an estimated $179.1 billion by 2024, growing at a CAGR of 6.4% from 2019 to 2024. And yet, perhaps because of its denotation as an ‘entertainment’ medium, the…

Read more

The effects of climate change on cybersecurity

Credit to Author: Pieter Arntz| Date: Fri, 13 Mar 2020 18:55:13 +0000

We explore the relationship between climate change and cybersecurity, two of the major issues of our time. Does cybersecurity actually contribute to global warming? Or can climate change illicit an uptick in cybercrime? We take a look.

Categories:

Tags:

(Read more…)

The post The effects of climate change on cybersecurity appeared first on Malwarebytes Labs.

Read more