Microsoft

MicrosoftSecurity

Uncursing the ncurses: Memory corruption vulnerabilities found in library

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 14 Sep 2023 11:30:00 +0000

A set of memory corruption vulnerabilities in the ncurses library could have allowed attackers to chain the vulnerabilities to elevate privileges and run code in the targeted program’s context or perform other malicious actions.

The post Uncursing the ncurses: Memory corruption vulnerabilities found in library appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Malware distributor Storm-0324 facilitates ransomware access

Credit to Author: Microsoft Threat Intelligence| Date: Tue, 12 Sep 2023 17:00:00 +0000

The threat actor that Microsoft tracks as Storm-0324 is a financially motivated group known to gain initial access using email-based initial infection vectors and then hand off access to compromised networks to other threat actors. These handoffs frequently lead to ransomware deployment. Beginning in July 2023, Storm-0324 was observed distributing payloads using an open-source tool […]

The post Malware distributor Storm-0324 facilitates ransomware access appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Cloud storage security: What’s new in the threat matrix

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 07 Sep 2023 17:00:00 +0000

We’re announcing the release of a second version of our threat matrix for storage services, a structured tool that assists in identifying and analyzing potential security threats on data stored in cloud storage services.

The post Cloud storage security: What’s new in the threat matrix appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Flax Typhoon using legitimate software to quietly access Taiwanese organizations

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 24 Aug 2023 16:30:00 +0000

China-based actor Flax Typhoon is exploiting known vulnerabilities for public-facing servers, legitimate VPN software, and open-source malware to gain access to Taiwanese organizations, but not taking further action.

The post Flax Typhoon using legitimate software to quietly access Taiwanese organizations appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS 

Credit to Author: Microsoft Threat Intelligence| Date: Fri, 11 Aug 2023 00:00:00 +0000

Microsoft researchers identified multiple high-severity vulnerabilities in the CODESYS V3 SDK that could put operational technology (OT) infrastructure at risk of attacks, such as remote code execution (RCE) and denial of service (DoS).

The post Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS  appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

New Microsoft Security innovations expand multicloud visibility and enhance multiplatform protection

Credit to Author: Vasu Jakkal| Date: Wed, 09 Aug 2023 16:00:00 +0000

Gain greater visibility into your multicloud environments to better understand your security posture, minimize risk, and detect and respond to threats in real time.

The post New Microsoft Security innovations expand multicloud visibility and enhance multiplatform protection appeared first on Microsoft Security Blog.

Read More