Microsoft

MicrosoftSecurity

North Korean threat actor targets small and midsize businesses with H0lyGh0st ransomware

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Thu, 14 Jul 2022 16:00:00 +0000

A group of actors originating from North Korea that MSTIC tracks as DEV-0530 has been developing and using ransomware in attacks since June 2021. This group, which calls itself H0lyGh0st, utilizes a ransomware payload with the same name.

The post North Korean threat actor targets small and midsize businesses with H0lyGh0st ransomware appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Microsoft recognized as a Leader in UEM Software 2022 IDC MarketScape reports

Credit to Author: Emma Jones| Date: Wed, 13 Jul 2022 17:00:00 +0000

Competition for talent has increased pressure to lead in the digital space, and business decisions now weigh user experience for employees heavily among costs and benefits. Workers insist on experiences that mirror their personal experience, often on their own device.

The post Microsoft recognized as a Leader in UEM Software 2022 IDC MarketScape reports appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Uncovering a macOS App Sandbox escape vulnerability: A deep dive into CVE-2022-26706

Credit to Author: Paul Oliveria| Date: Wed, 13 Jul 2022 16:00:00 +0000

Microsoft uncovered a vulnerability in macOS that could allow specially crafted codes to escape the App Sandbox and run unrestricted on the system. We shared these findings with Apple, and fix for this vulnerability, now identified as CVE-2022-26706, was included in the security updates on May 16, 2022.

The post Uncovering a macOS App Sandbox escape vulnerability: A deep dive into CVE-2022-26706 appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud

Credit to Author: Paul Oliveria| Date: Tue, 12 Jul 2022 16:00:00 +0000

A large-scale phishing campaign that attempted to target over 10,000 organizations since September 2021 used adversary-in-the-middle (AiTM) phishing sites to steal passwords, hijack a user’s sign-in session, and skip the authentication process, even if the user had enabled multifactor authentication (MFA).

The post From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Introducing security for unmanaged devices in the Enterprise network with Microsoft Defender for IoT

Credit to Author: Christine Barrett| Date: Mon, 11 Jul 2022 16:00:00 +0000

Microsoft Defender IoT is generally available to help organizations challenged with securing unmanaged Internet of Things devices connected to the network.

The post Introducing security for unmanaged devices in the Enterprise network with Microsoft Defender for IoT appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration

Credit to Author: Christine Barrett| Date: Thu, 07 Jul 2022 16:00:00 +0000

We are excited to share that Microsoft has been rated Outstanding in Functionality in the May 2022 KuppingerCole Market Compass for Secure Collaboration. Microsoft was also the only company to be awarded the highest possible score of Strong Positive in all five categories.

The post KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Toll fraud malware: How an Android application can drain your wallet

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Thu, 30 Jun 2022 14:00:00 +0000

Toll fraud malware, a subcategory of billing fraud in which malicious applications subscribe users to premium services without their knowledge or consent, is one of the most prevalent types of Android malware – and it continues to evolve.

The post Toll fraud malware: How an Android application can drain your wallet appeared first on Microsoft Security Blog.

Read More