Microsoft

MicrosoftSecurity

Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign

Credit to Author: Windows Defender Research| Date: Wed, 07 Mar 2018 21:58:45 +0000

Just before noon on March 6 (PST), Windows Defender AV blocked more than 80,000 instances of several sophisticated trojans that exhibited advanced cross-process injection techniques, persistence mechanisms, and evasion methods. Behavior-based signals coupled with cloud-powered machine learning models uncovered this new wave of infection attempts. The trojans, which are new variants of Dofoil (also known

Read more

Read More
MicrosoftSecurity

How Office 365 protects your organization from modern phishing campaigns

Credit to Author: Microsoft Secure Blog Staff| Date: Wed, 07 Mar 2018 17:00:46 +0000

This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security. We often allude to the benefits of having an integrated threat protection stack in Office 365. Today we wanted to take the opportunity to walk you through how the combined features and services in the Office 365 threat management stack help

Read more

Read More
MicrosoftSecurity

Tips for getting started on your security deployment

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 06 Mar 2018 19:00:32 +0000

This blog is part of a series that responds to common questions we receive from customers about how to most effectively deploy Microsoft 365 Security. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. This past year, weve been listening to our customers questions about how to

Read more

Read More
MicrosoftSecurity

The role that regions can and should play in critical infrastructure protection

Credit to Author: Jenny Erie| Date: Mon, 05 Mar 2018 19:00:28 +0000

Todays report, Critical Infrastructure Protection in Latin America and the Caribbean 2018, developed in partnership between Microsoft and the Organization of American States (OAS), demonstrates the value of regional cooperation in global efforts to increase the security of the online environment where it matters most. It acknowledges that rather than focusing on all politics is

Read more

Read More
MicrosoftSecurity

FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines

Credit to Author: Windows Defender ATP| Date: Thu, 01 Mar 2018 22:37:20 +0000

Office 365 Advanced Threat Protection (Office 365 ATP) blocked many notable zero-day exploits in 2017. In our analysis, one activity group stood out: NEODYMIUM. This threat actor is remarkable for two reasons: Its access to sophisticated zero-day exploits for Microsoft and Adobe software Its use of an advanced piece of government-grade surveillance spyware FinFisher, also

Read more

Read More
MicrosoftSecurity

Best practices for securely moving workloads to Microsoft Azure

Credit to Author: Jenny Erie| Date: Mon, 26 Feb 2018 17:00:04 +0000

Azure is Microsofts cloud computing environment. It offers customers three primary service delivery models including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Adopting cloud technologies requires a shared responsibility model for security, with Microsoft responsible for certain controls and the customer others, depending on the service

Read more

Read More
MicrosoftSecurity

How to mitigate rapid cyberattacks such as Petya and WannaCrypt

Credit to Author: Jenny Erie| Date: Wed, 21 Feb 2018 17:00:18 +0000

In the first blog post of this 3-part series, we introduced what rapid cyberattacks are and illustrated how rapid cyberattacks are different in terms of execution and outcome. In the second blog post, we provided some details on Petya and how it worked. In this final blog post, we will share: Microsofts roadmap of recommendations

Read more

Read More
MicrosoftSecurity

How a national cybersecurity agency can help avoid a national cybersecurity quagmire

Credit to Author: Jenny Erie| Date: Mon, 19 Feb 2018 17:00:04 +0000

This last October we saw more countries than ever participate in initiatives to raise cybersecurity awareness. What was once largely a US approach has evolved into events and initiatives around the world by governments, civil society groups, and private sector partners. This increased breadth and depth of activity reflects governments increased understanding of the importance

Read more

Read More