Ghost in the shell: Investigating web shell attacks

Credit to Author: Eric Avena| Date: Tue, 04 Feb 2020 17:30:40 +0000

Web shell attacks allow adversaries to run commands and steal data from an Internet-facing server or use the server as launch pad for further attacks against the affected organization.

The post Ghost in the shell: Investigating web shell attacks appeared first on Microsoft Security.

Read more

Ransomware response—to pay or not to pay?

Credit to Author: Todd VanderArk| Date: Mon, 16 Dec 2019 17:00:07 +0000

As part of Microsoft’s Detection and Response Team (DART) Incident Response engagements, we regularly get asked by customers about “paying the ransom” following a ransomware attack.

The post Ransomware response—to pay or not to pay? appeared first on Microsoft Security.

Read more

Protect against BlueKeep

Credit to Author: Todd VanderArk| Date: Thu, 08 Aug 2019 16:00:57 +0000

DART offers steps you can take to protect your network from BlueKeep, the “wormable” vulnerability that can create a large-scale outbreak due to its ability to replicate and propagate.

The post Protect against BlueKeep appeared first on Microsoft Security.

Read more