Multi-stage downloader Trojan sLoad abuses BITS almost exclusively for malicious activities

Credit to Author: Eric Avena| Date: Thu, 12 Dec 2019 17:30:26 +0000

Many of today’s threats evolve to incorporate as many living-off-the-land techniques as possible into the attack chain. The PowerShell-based downloader Trojan known as sLoad, however, puts all its bets on BITS. Background Intelligent Transfer Service (BITS) is a component of the Windows operating system that provides an ability to transfer files in an asynchronous and…

The post Multi-stage downloader Trojan sLoad abuses BITS almost exclusively for malicious activities appeared first on Microsoft Security.

Read more

Improve cyber supply chain risk management with Microsoft Azure

Credit to Author: Todd VanderArk| Date: Mon, 09 Dec 2019 17:00:03 +0000

To keep government agencies secure in the cloud, we must keep pace and stay ahead of cyber attackers by defending the cyber supply chain with Microsoft Azure.

The post Improve cyber supply chain risk management with Microsoft Azure appeared first on Microsoft Security.

Read more

Microsoft Security—a Leader in 5 Gartner Magic Quadrants

Credit to Author: Todd VanderArk| Date: Tue, 03 Dec 2019 17:00:21 +0000

Gartner has named Microsoft Security a Leader in five Magic Quadrants, which demonstrates balanced progress and effort in all execution and vision categories.

The post Microsoft Security—a Leader in 5 Gartner Magic Quadrants appeared first on Microsoft Security.

Read more

Further enhancing security from Microsoft, not just for Microsoft

Credit to Author: Todd VanderArk| Date: Mon, 04 Nov 2019 17:00:37 +0000

Today, at the Microsoft Ignite Conference in Orlando, Florida, I’m thrilled to share the significant progress we’re making on delivering endpoint security from Microsoft, not just for Microsoft.

The post Further enhancing security from Microsoft, not just for Microsoft appeared first on Microsoft Security.

Read more

Microsoft’s 4 principles for an effective security operations center

Credit to Author: Todd VanderArk| Date: Tue, 15 Oct 2019 16:00:50 +0000

Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC.

The post Microsoft’s 4 principles for an effective security operations center appeared first on Microsoft Security.

Read more

Microsoft’s 4 principals for an effective security operations center

Credit to Author: Todd VanderArk| Date: Tue, 15 Oct 2019 16:00:50 +0000

Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC.

The post Microsoft’s 4 principals for an effective security operations center appeared first on Microsoft Security.

Read more

In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks

Credit to Author: Eric Avena| Date: Tue, 08 Oct 2019 15:00:11 +0000

Two new machine learning protection features within the behavioral blocking and containment capabilities in Microsoft Defender ATP specialize in detecting threats by analyzing behavior, adding new layers of protection after an attack has started running.

The post In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks appeared first on Microsoft Security.

Read more