Security

MicrosoftSecurity

Assessing Microsoft 365 security solutions using the NIST Cybersecurity Framework

Credit to Author: Microsoft Secure Blog Staff| Date: Mon, 02 Jul 2018 19:00:38 +0000

This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series, youll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blogNew FastTrack benefit: Deployment support for Co-management on Windows 10 devices.

Read more

Read More
MalwareBytesSecurity

Mac malware targets cryptomining users

Credit to Author: Thomas Reed| Date: Mon, 02 Jul 2018 18:36:10 +0000

A new Mac malware called OSX.Dummy is being distributed on cryptomining chat groups that, even after being removed, leaves behind remnants for future malware to find.

Categories:

Tags:

(Read more…)

The post Mac malware targets cryptomining users appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (June 25 – July 1)

Credit to Author: Malwarebytes Labs| Date: Mon, 02 Jul 2018 17:56:24 +0000

A round up of the security news from June 25 – July 1, including a look at the EU cyber force proposal, cryptomining dialing things down, and the risks of handing out personal information online.

Categories:

Tags:

(Read more…)

The post A week in security (June 25 – July 1) appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

Summer Vacation Plans? Be Safe When Connecting!

Credit to Author: Trend Micro| Date: Mon, 02 Jul 2018 13:00:31 +0000

Tips to Protect Yourself While Traveling Summer travel should be a respite from work, when you relax and don’t have to worry about business. And your mobile devices can help make it easier, whether it’s booking a flight or a hotel room, ordering a cab or an Uber driver, browsing websites for your next destination,…

The post Summer Vacation Plans? Be Safe When Connecting! appeared first on .

Read More
MicrosoftSecurity

Taking apart a double zero-day sample discovered in joint hunt with ESET

Credit to Author: Windows Defender ATP| Date: Mon, 02 Jul 2018 15:00:00 +0000

In late March 2018, I analyzed an interesting PDF sample found by ESET senior malware researcher Anton Cherpanov. The sample was initially reported to Microsoft as a potential exploit for an unknown Windows kernel vulnerability. During my investigation in parallel with ESET researchers, I was surprised to discover two new zero-day exploits in the same

Read more

Read More