Forrester names Microsoft a Leader in the 2023 Zero Trust Platform Providers Wave™ report

Credit to Author: Joy Chik| Date: Tue, 19 Sep 2023 16:00:00 +0000

Microsoft is proud to be recognized as a Leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023 report.

The post Forrester names Microsoft a Leader in the 2023 Zero Trust Platform Providers Wave™ report appeared first on Microsoft Security Blog.

Read more

Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 14 Sep 2023 16:30:00 +0000

Since February 2023, Microsoft has observed a high volume of password spray attacks attributed to Peach Sandstorm, an Iranian nation-state group. In a small number of cases, Peach Sandstorm successfully authenticated to an account and used a combination of publicly available and custom tools for persistence, lateral movement, and exfiltration.

The post Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets appeared first on Microsoft Security Blog.

Read more

Uncursing the ncurses: Memory corruption vulnerabilities found in library

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 14 Sep 2023 11:30:00 +0000

A set of memory corruption vulnerabilities in the ncurses library could have allowed attackers to chain the vulnerabilities to elevate privileges and run code in the targeted program’s context or perform other malicious actions.

The post Uncursing the ncurses: Memory corruption vulnerabilities found in library appeared first on Microsoft Security Blog.

Read more

Malware distributor Storm-0324 facilitates ransomware access

Credit to Author: Microsoft Threat Intelligence| Date: Tue, 12 Sep 2023 17:00:00 +0000

The threat actor that Microsoft tracks as Storm-0324 is a financially motivated group known to gain initial access using email-based initial infection vectors and then hand off access to compromised networks to other threat actors. These handoffs frequently lead to ransomware deployment. Beginning in July 2023, Storm-0324 was observed distributing payloads using an open-source tool […]

The post Malware distributor Storm-0324 facilitates ransomware access appeared first on Microsoft Security Blog.

Read more

Cloud storage security: What’s new in the threat matrix

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 07 Sep 2023 17:00:00 +0000

We’re announcing the release of a second version of our threat matrix for storage services, a structured tool that assists in identifying and analyzing potential security threats on data stored in cloud storage services.

The post Cloud storage security: What’s new in the threat matrix appeared first on Microsoft Security Blog.

Read more

Flax Typhoon using legitimate software to quietly access Taiwanese organizations

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 24 Aug 2023 16:30:00 +0000

China-based actor Flax Typhoon is exploiting known vulnerabilities for public-facing servers, legitimate VPN software, and open-source malware to gain access to Taiwanese organizations, but not taking further action.

The post Flax Typhoon using legitimate software to quietly access Taiwanese organizations appeared first on Microsoft Security Blog.

Read more

How the Microsoft Incident Response team helps customers remediate threats

Credit to Author: Microsoft Incident Response| Date: Tue, 15 Aug 2023 16:00:00 +0000

Microsoft Incident Response is a global team comprised of cybersecurity experts with deep, highly specialized knowledge in breach detection, response, and recovery.

The post How the Microsoft Incident Response team helps customers remediate threats appeared first on Microsoft Security Blog.

Read more