Microsoft

MicrosoftSecurity

Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Mon, 09 May 2022 13:00:00 +0000

Microsoft coined the term “human-operated ransomware” to clearly define a class of attack driven by expert humane intelligence at every step of the attack chain and culminate in intentional business disruption and extortion. In this blog, we explain the ransomware-as-a-service affiliate model and disambiguate between the attacker tools and the various threat actors at play during a security incident.

The post Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

How a senior product manager is leading the passwordless movement at Microsoft

Credit to Author: Christine Barrett| Date: Wed, 04 May 2022 16:00:00 +0000

May 5, 2022, is World Password Day, a day we all use to create awareness around password security. At Microsoft, we choose to celebrate replacing passwords with better and more secure ways to sign in. I can’t think of a better person at Microsoft to represent this journey than Libby Brown, a senior product manager…

The post How a senior product manager is leading the passwordless movement at Microsoft appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

How one senior developer brings the startup spirit to Microsoft

Credit to Author: Christine Barrett| Date: Wed, 27 Apr 2022 16:00:00 +0000

Igor Sakhnov, corporate vice president of Identity and Network Access Engineering, talks with software engineer George Maina about his entrepreneurial journey and the beginnings of the Microsoft Africa Development Center in Kenya.

The post How one senior developer brings the startup spirit to Microsoft appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn

Credit to Author: Katie McCafferty| Date: Tue, 26 Apr 2022 16:00:00 +0000

Microsoft has discovered several vulnerabilities, collectively referred to as Nimbuspwn, that could be chained together, allowing an attacker to elevate privileges to root on many Linux desktop endpoints. Leveraging Nimbuspwn as a vector for root access could allow attackers to achieve greater impact on vulnerable devices by deploying payloads and performing other malicious actions via arbitrary root code execution.

The post Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Microsoft best practices for managing IoT security concerns

Credit to Author: Christine Barrett| Date: Mon, 25 Apr 2022 16:00:00 +0000

The Internet of Things, or IoT, has expanded beyond the mere concept that it was when first introduced. IoT is now part of most individuals’ daily activities, from smart speakers and thermostats to smartwatches and vehicles. IoT devices and systems bring massive convenience and functionality. However, due to the complicated nature of IoT, when implementing and managing IoT, security must be top of mind.

The post Microsoft best practices for managing IoT security concerns appeared first on Microsoft Security Blog.

Read More