How to mitigate rapid cyberattacks such as Petya and WannaCrypt

Credit to Author: Jenny Erie| Date: Wed, 21 Feb 2018 17:00:18 +0000

In the first blog post of this 3-part series, we introduced what rapid cyberattacks are and illustrated how rapid cyberattacks are different in terms of execution and outcome. In the second blog post, we provided some details on Petya and how it worked. In this final blog post, we will share: Microsofts roadmap of recommendations

Read more

Read more

How a national cybersecurity agency can help avoid a national cybersecurity quagmire

Credit to Author: Jenny Erie| Date: Mon, 19 Feb 2018 17:00:04 +0000

This last October we saw more countries than ever participate in initiatives to raise cybersecurity awareness. What was once largely a US approach has evolved into events and initiatives around the world by governments, civil society groups, and private sector partners. This increased breadth and depth of activity reflects governments increased understanding of the importance

Read more

Read more

How artificial intelligence stopped an Emotet outbreak

Credit to Author: Windows Defender ATP| Date: Wed, 14 Feb 2018 14:43:26 +0000

At 12:46 a.m. local time on February 3, a Windows 7 Pro customer in North Carolina became the first would-be victim of a new malware attack campaign for Trojan:Win32/Emotet. In the next 30 minutes, the campaign tried to attack over a thousand potential victims, all of whom were instantly and automatically protected by Windows Defender

Read more

Read more

Cyber resilience for the modern enterprise

Credit to Author: Microsoft Secure Blog Staff| Date: Mon, 12 Feb 2018 17:00:14 +0000

Many organizations are undergoing a digital transformation that leverages a mix of cloud and on-premises assets to increase business efficiency and growth. While increased dependence on technology is necessary for this transformation, and to position the business for success, it does pose risks from security threats. An organization cannot afford to wait until after users

Read more

Read more

Developing an effective cyber strategy

Credit to Author: Jenny Erie| Date: Wed, 07 Feb 2018 17:00:06 +0000

The word strategy has its origins in the Roman Empire and was used to describe the leading of troops in battle. From a military perspective, strategy is a top-level plan designed to achieve one or more high-order goals. A clear strategy is especially important in times of uncertainty as it provides a framework for those

Read more

Read more

Overview of Petya, a rapid cyberattack

Credit to Author: Jenny Erie| Date: Mon, 05 Feb 2018 17:00:26 +0000

In the first blog post of this 3-part series, we introduced what rapid cyberattacks are and illustrated how they are different in terms of execution and outcome. Next, we will go into some more details on the Petya (aka NotPetya) attack. How Petya worked The Petya attack chain is well understood, although a few small

Read more

Read more

Protecting customers from being intimidated into making an unnecessary purchase

Credit to Author: Windows Defender ATP| Date: Tue, 30 Jan 2018 22:00:05 +0000

There has been an increase in free versions of programs that purport to scan computers for various errors, and then use alarming, coercive messages to scare customers into buying a premium version of the same program. The paid version of these programs, usually called cleaner or optimizer applications, purportedly fixes the problems discovered by the

Read more

Read more

IGF proves the value of bottom-up, multi-stakeholder model in cyberspace policy-making

Credit to Author: Jenny Erie| Date: Mon, 29 Jan 2018 17:00:28 +0000

In December, the Internet Governance Forum (IGF) brought the world together to talk about the internet. I tend to take a definite interest in cybersecurity, but there were many more important topics discussed. They ranged from diversity in the technology sector through to philosophy in the digital age. Cybersecurity was, nonetheless, a major theme. My

Read more

Read more

Now you see me: Exposing fileless malware

Credit to Author: Windows Defender ATP| Date: Wed, 24 Jan 2018 14:00:21 +0000

Attackers are determined to circumvent security defenses using increasingly sophisticated techniques. Fileless malware boosts the stealth and effectiveness of an attack, and two of last years major ransomware outbreaks (Petya and WannaCry) used fileless techniques as part of their kill chains. The idea behind fileless malware is simple: If tools already exist on a device

Read more

Read more

Overview of rapid cyberattacks

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 23 Jan 2018 17:00:13 +0000

Rapid cyberattacks like Petya and WannaCrypt have reset our expectations on the speed and scope of damage that a cyberattack can inflict. The Microsoft Enterprise Cybersecurity Group Detection and Response team worked extensively to help customers respond to and recover from these kinds of attacks. In 2017, among the global enterprise customers that we worked

Read more

Read more

Microsoft offers several mechanisms to protect against ransomware

Credit to Author: Microsoft Secure Blog Staff| Date: Mon, 15 Jan 2018 17:00:38 +0000

The start of a new year is the perfect time to reassess your security strategy and tactics especially when looking back at the new levels of ransomwares reach and damage in 2017. Its no secret that ransomware attacks are increasing. In fact, a business is hit with ransomware every 40 seconds. If ransomware does

Read more

Read more