Ghost in the shell: Investigating web shell attacks

Credit to Author: Eric Avena| Date: Tue, 04 Feb 2020 17:30:40 +0000

Web shell attacks allow adversaries to run commands and steal data from an Internet-facing server or use the server as launch pad for further attacks against the affected organization.

The post Ghost in the shell: Investigating web shell attacks appeared first on Microsoft Security.

Read more

sLoad launches version 2.0, Starslord

Credit to Author: Eric Avena| Date: Tue, 21 Jan 2020 18:00:39 +0000

sLoad has launched version 2.0. With the new version, sLoad, which is a PowerShell-based Trojan downloader notable for its almost exclusive use of the Windows BITS service for malicious activities, has added an anti-analysis trick and the ability to track the stage of infection for every affected machine.

The post sLoad launches version 2.0, Starslord appeared first on Microsoft Security.

Read more

CISO series: Lessons learned from the Microsoft SOC—Part 3b: A day in the life

Credit to Author: Todd VanderArk| Date: Mon, 23 Dec 2019 17:00:57 +0000

In this next post in our series, we provide insight into a day in the life of our SOC analysts investigating common front door attacks.

The post CISO series: Lessons learned from the Microsoft SOC—Part 3b: A day in the life appeared first on Microsoft Security.

Read more

Mobile threat defense and intelligence are a core part of cyber defense

Credit to Author: Todd VanderArk| Date: Thu, 19 Dec 2019 17:00:32 +0000

To safeguard company assets, organizations need to augment their global cyber defense strategy with mobile threat intelligence.

The post Mobile threat defense and intelligence are a core part of cyber defense appeared first on Microsoft Security.

Read more

Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks

Credit to Author: Eric Avena| Date: Wed, 18 Dec 2019 18:00:24 +0000

Microsoft Defender ATP data scientists and threat hunters collaborate to use a data science-driven approach to detecting RDP brute force attacks to protect customers against real-world threats.

The post Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks appeared first on Microsoft Security.

Read more

Multi-stage downloader Trojan sLoad abuses BITS almost exclusively for malicious activities

Credit to Author: Eric Avena| Date: Thu, 12 Dec 2019 17:30:26 +0000

Many of today’s threats evolve to incorporate as many living-off-the-land techniques as possible into the attack chain. The PowerShell-based downloader Trojan known as sLoad, however, puts all its bets on BITS. Background Intelligent Transfer Service (BITS) is a component of the Windows operating system that provides an ability to transfer files in an asynchronous and…

The post Multi-stage downloader Trojan sLoad abuses BITS almost exclusively for malicious activities appeared first on Microsoft Security.

Read more

Improve cyber supply chain risk management with Microsoft Azure

Credit to Author: Todd VanderArk| Date: Mon, 09 Dec 2019 17:00:03 +0000

To keep government agencies secure in the cloud, we must keep pace and stay ahead of cyber attackers by defending the cyber supply chain with Microsoft Azure.

The post Improve cyber supply chain risk management with Microsoft Azure appeared first on Microsoft Security.

Read more

Microsoft Security—a Leader in 5 Gartner Magic Quadrants

Credit to Author: Todd VanderArk| Date: Tue, 03 Dec 2019 17:00:21 +0000

Gartner has named Microsoft Security a Leader in five Magic Quadrants, which demonstrates balanced progress and effort in all execution and vision categories.

The post Microsoft Security—a Leader in 5 Gartner Magic Quadrants appeared first on Microsoft Security.

Read more

Further enhancing security from Microsoft, not just for Microsoft

Credit to Author: Todd VanderArk| Date: Mon, 04 Nov 2019 17:00:37 +0000

Today, at the Microsoft Ignite Conference in Orlando, Florida, I’m thrilled to share the significant progress we’re making on delivering endpoint security from Microsoft, not just for Microsoft.

The post Further enhancing security from Microsoft, not just for Microsoft appeared first on Microsoft Security.

Read more

Microsoft’s 4 principles for an effective security operations center

Credit to Author: Todd VanderArk| Date: Tue, 15 Oct 2019 16:00:50 +0000

Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC.

The post Microsoft’s 4 principles for an effective security operations center appeared first on Microsoft Security.

Read more