Microsoft

MicrosoftSecurity

Working towards a more diverse future in security

Credit to Author: Jenny Erie| Date: Wed, 28 Mar 2018 16:00:31 +0000

Last year I embarked on an exercise to examine diversity in cybersecurity. As one full year has passed, I decided to revisit this topic and the ongoing challenges of recruiting AND retaining diverse talent in the cybersecurity field. This past year saw the #MeToo movement in the spotlight, and while womens issues were brought to

Read more

Read More
MicrosoftSecurity

Filling the gaps in international law is essential to making cyberspace a safer place

Credit to Author: Jenny Erie| Date: Tue, 27 Mar 2018 16:00:31 +0000

A month ago, on the sidelines of the Munich Security Conference, Microsoft organized an expert workshop to discuss gaps in international law as it applies to cyberspace. We were fortunate enough to bring together twenty leading stakeholders, including international legal experts, United Nations Group of Governmental Experts on Developments in the Field of Information and

Read more

Read More
MicrosoftSecurity

Why Windows Defender Antivirus is the most deployed in the enterprise

Credit to Author: Windows Defender ATP| Date: Thu, 22 Mar 2018 16:58:23 +0000

Statistics about the success and sophistication of malware can be daunting. The following figure is no different: Approximately 96% of all malware is polymorphic meaning that it is only experienced by a single user and device before it is replaced with yet another malware variant. This is because in most cases malware is caught

Read more

Read More
MicrosoftSecurity

Accelerate your security deployment with FastTrack for Microsoft 365

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 20 Mar 2018 16:00:00 +0000

This blog is part of a series that responds to common questions we receive from customers about Microsoft 365 Security and Enterprise Mobility + Security. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. Inpart one of this series, we outlined Tips for getting started on your

Read more

Read More
MicrosoftSecurity

Microsoft Security Intelligence Report volume 23 is now available

Credit to Author: Microsoft Secure Blog Staff| Date: Thu, 15 Mar 2018 13:00:02 +0000

As security incidents and events keep making headlines, Microsoft is committed to helping our customers and the rest of the security community to make sense of the risks and offer recommendations. Old and new malware continues to get propagated through massive botnets, attackers are increasing focus on easier attack methods such as phishing, and ransomware

Read more

Read More
MicrosoftSecurity

Sharing research and discoveries at PWN2OWN

Credit to Author: Windows Defender Research| Date: Wed, 14 Mar 2018 23:58:49 +0000

The annual PWN2OWN exploit contest at the CanSecWest conference in Vancouver, British Columbia, Canada, brings together some of the top security talent from across the globe in a friendly competition. For the participants, these events are a platform to demonstrate world-class skills and vie for significant cash prizes. For companies like Microsoft, where we have

Read more

Read More
MicrosoftSecurity

Poisoned peer-to-peer app kicked off Dofoil coin miner outbreak

Credit to Author: Windows Defender Research| Date: Tue, 13 Mar 2018 22:27:06 +0000

On March 7, we reported that a massive Dofoil campaign attempted to install malicious cryptocurrency miners on hundreds of thousands of computers. Windows Defender Antivirus, with its behavior monitoring, machine learning technologies, and layered approach to security detected and blocked the attack within milliseconds.Windows 10 S, a special configuration of Windows 10 providing Microsoft-verified security,

Read more

Read More
MicrosoftSecurity

Invisible resource thieves: The increasing threat of cryptocurrency miners

Credit to Author: Windows Defender ATP| Date: Tue, 13 Mar 2018 12:57:36 +0000

The surge in Bitcoin prices has driven widescale interest in cryptocurrencies. While the future of digital currencies is uncertain, they are shaking up the cybersecurity landscape as they continue to influence the intent and nature of attacks. Cybercriminals gave cryptocurrencies a bad name when ransomware started instructing victims to pay ransom in the form of

Read more

Read More