Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them

Credit to Author: Jim Flack| Date: Thu, 02 Jul 2020 16:00:59 +0000

Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services.

The post Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them appeared first on Microsoft Security.

Read more

Best security, compliance, and privacy practices for the rapid deployment of publicly facing Microsoft Power Apps intake forms

Credit to Author: Jim Flack| Date: Mon, 29 Jun 2020 19:00:20 +0000

Security is a major concern of not only major governments but of other entities using Microsoft Power App intake forms.

The post Best security, compliance, and privacy practices for the rapid deployment of publicly facing Microsoft Power Apps intake forms appeared first on Microsoft Security.

Read more

Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting

Credit to Author: Jim Flack| Date: Thu, 25 Jun 2020 16:00:18 +0000

This blog provides lessons learned on how Microsoft hunts for threats in our IT environment and how you can apply these lessons to building or improving your threat hunting program. This is the seventh in a series.

The post Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting appeared first on Microsoft Security.

Read more

Defending Exchange servers under attack

Credit to Author: Eric Avena| Date: Wed, 24 Jun 2020 16:00:40 +0000

Exchange servers are high-value targets. These attacks also tend to be advanced threats with highly evasive, fileless techniques. Keeping these servers safe from these advanced attacks is of utmost importance.

The post Defending Exchange servers under attack appeared first on Microsoft Security.

Read more

Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

Credit to Author: Eric Avena| Date: Thu, 18 Jun 2020 16:00:03 +0000

In the first blog in the Inside Microsoft Threat Protection series, we will show how MTP provides unparalleled end-to-end visibility into the activities of nation-state level attacks like HOLMIUM.

The post Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint appeared first on Microsoft Security.

Read more

Exploiting a crisis: How cybercriminals behaved during the outbreak

Credit to Author: Eric Avena| Date: Tue, 16 Jun 2020 16:00:49 +0000

Cybercriminals adapted their tactics to match what was going on in the world, and what we saw in the threat environment was parallel to the uptick in COVID-19 headlines and the desire for more information.

The post Exploiting a crisis: How cybercriminals behaved during the outbreak appeared first on Microsoft Security.

Read more

Misconfigured Kubeflow workloads are a security risk

Credit to Author: Jim Flack| Date: Wed, 10 Jun 2020 18:00:40 +0000

Azure Security Center monitors and defends thousands of Kubernetes clusters running on top of Azure Kubernetes Service. In this blog, we’ll reveal a new campaign that was observed recently by ASC that targets Kubeflow, a machine learning toolkit for Kubernetes.

The post Misconfigured Kubeflow workloads are a security risk appeared first on Microsoft Security.

Read more

The science behind Microsoft Threat Protection: Attack modeling for finding and stopping evasive ransomware

Credit to Author: Eric Avena| Date: Wed, 10 Jun 2020 17:42:07 +0000

Microsoft Threat Protection uses a data-driven approach for identifying lateral movement, combining industry-leading optics, expertise, and data science to deliver automated discovery of some of the most critical threats today.

The post The science behind Microsoft Threat Protection: Attack modeling for finding and stopping evasive ransomware appeared first on Microsoft Security.

Read more