Microsoft

MicrosoftSecurity

How Microsoft and Sonrai integrate to eliminate attack paths

Credit to Author: Eugene Tcheby and Tally Shea| Date: Tue, 13 Jun 2023 16:00:00 +0000

Cloud development challenges conventional thinking about risk. Sonrai integrates with Microsoft Sentinel to monitor threats across vectors and automate responses by leveraging security orchestration, automation, and response playbooks, and Microsoft Defender for Cloud to provide visibility across the entire digital estate by identifying possible attack paths and remediating vulnerabilities.

The post How Microsoft and Sonrai integrate to eliminate attack paths appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Detecting and mitigating a multi-stage AiTM phishing and BEC campaign

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 08 Jun 2023 16:00:00 +0000

Microsoft Defender Experts observed a multi-stage adversary-in-the-middle (AiTM) and business email compromise (BEC) attack targeting banking and financial services organizations over two days. This attack originated from a compromised trusted vendor, involved AiTM and BEC attacks across multiple supplier/partner organizations for financial fraud, and did not use a reverse proxy like typical AiTM attacks.

The post Detecting and mitigating a multi-stage AiTM phishing and BEC campaign appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

XDR meets IAM: Comprehensive identity threat detection and response with Microsoft

Credit to Author: Rob Lefferts and Alex Weinert| Date: Wed, 31 May 2023 16:00:00 +0000

Identity-based attacks are on the rise, making identity protection more important than ever. Explore our blog post to learn how Microsoft’s Identity Threat Detection and Response can help.

The post XDR meets IAM: Comprehensive identity threat detection and response with Microsoft appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

New macOS vulnerability, Migraine, could bypass System Integrity Protection

Credit to Author: Microsoft Threat Intelligence| Date: Tue, 30 May 2023 16:00:00 +0000

A new vulnerability, which we refer to as “Migraine”, could allow an attacker with root access to bypass System Integrity Protection (SIP) in macOS and perform arbitrary operations on a device.

The post New macOS vulnerability, Migraine, could bypass System Integrity Protection appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Volt Typhoon targets US critical infrastructure with living-off-the-land techniques

Credit to Author: Microsoft Threat Intelligence| Date: Wed, 24 May 2023 19:00:00 +0000

Chinese state-sponsored actor Volt Typhoon is using stealthy techniques to target US critical infrastructure, conduct espionage, and dwell in compromised environments.

The post Volt Typhoon targets US critical infrastructure with living-off-the-land techniques appeared first on Microsoft Security Blog.

Read More