Microsoft contributes S2C2F to OpenSSF to improve supply chain security

Credit to Author: Emma Jones| Date: Wed, 16 Nov 2022 18:00:00 +0000

We are pleased to announce that the S2C2F has been adopted by the OpenSSF under the Supply Chain Integrity Working Group and formed into its own Special Initiative Group. Our peers at the OpenSSF and across the globe agree with Microsoft when it comes to how fundamental this work is to improving supply chain security for everyone.

The post Microsoft contributes S2C2F to OpenSSF to improve supply chain security appeared first on Microsoft Security Blog.

Read more

PowerShell: An Attacker’s Paradise

Credit to Author: Mrigank Tyagi| Date: Fri, 29 Jul 2022 12:13:02 +0000

  PowerShell was originally intended as a task automation and configuration management program for system administrators. However, it…

The post PowerShell: An Attacker’s Paradise appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Is the shift to 5G threatening the world of IoT Security?

Credit to Author: Vijay Yadav| Date: Thu, 23 Jun 2022 11:23:42 +0000

The future is completely open, and so is IoT. The IoT or Internet of Things has completely digitized…

The post Is the shift to 5G threatening the world of IoT Security? appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Securing your IoT with Edge Secured-core devices

Credit to Author: Christine Barrett| Date: Tue, 21 Jun 2022 06:00:00 +0000

To simplify your IoT security journey, today, we’re announcing the availability of Windows IoT Edge Secured-core devices available in the Azure Certified Device catalog from Lenovo, ASUS and AAEON, additionally we’re also announcing the availability of devices that meet the Microsoft sponsored Edge Compute Node protection profile which is governed with industry oversight, from Scalys and Eurotech. And learn more on Microsoft’s investments in MCU security.

The post Securing your IoT with Edge Secured-core devices appeared first on Microsoft Security Blog.

Read more

Unfixed vulnerability in popular library puts IoT products at risk

Credit to Author: Pieter Arntz| Date: Wed, 04 May 2022 16:13:27 +0000

Researchers have disclosed an unpatched vulnerability in the popular uClibc library that could allow attackers to use DNS poisoning.

The post Unfixed vulnerability in popular library puts IoT products at risk appeared first on Malwarebytes Labs.

Read more

Clouding the issue: what cloud threats lie in wait in 2022?

Credit to Author: Christopher Boyd| Date: Thu, 17 Mar 2022 13:25:43 +0000

We offer up some thoughts on where new and continuing attacks in the world of cloud may occur, alongside linking some current examples.

The post Clouding the issue: what cloud threats lie in wait in 2022? appeared first on Malwarebytes Labs.

Read more

Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 16 Mar 2022 15:00:00 +0000

The Microsoft Defender for IoT research team has recently discovered the exact method through which MikroTik devices are used in Trickbot’s C2 infrastructure. In this blog, we share the analysis of this method and provide insights on how attackers gain access and how they use compromised IoT devices in Trickbot attacks.

The post Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure appeared first on Microsoft Security Blog.

Read more