Microsoft

MicrosoftSecurity

How artificial intelligence stopped an Emotet outbreak

Credit to Author: Windows Defender ATP| Date: Wed, 14 Feb 2018 14:43:26 +0000

At 12:46 a.m. local time on February 3, a Windows 7 Pro customer in North Carolina became the first would-be victim of a new malware attack campaign for Trojan:Win32/Emotet. In the next 30 minutes, the campaign tried to attack over a thousand potential victims, all of whom were instantly and automatically protected by Windows Defender

Read more

Read More
MicrosoftSecurity

Cyber resilience for the modern enterprise

Credit to Author: Microsoft Secure Blog Staff| Date: Mon, 12 Feb 2018 17:00:14 +0000

Many organizations are undergoing a digital transformation that leverages a mix of cloud and on-premises assets to increase business efficiency and growth. While increased dependence on technology is necessary for this transformation, and to position the business for success, it does pose risks from security threats. An organization cannot afford to wait until after users

Read more

Read More
MicrosoftSecurity

Protecting customers from being intimidated into making an unnecessary purchase

Credit to Author: Windows Defender ATP| Date: Tue, 30 Jan 2018 22:00:05 +0000

There has been an increase in free versions of programs that purport to scan computers for various errors, and then use alarming, coercive messages to scare customers into buying a premium version of the same program. The paid version of these programs, usually called cleaner or optimizer applications, purportedly fixes the problems discovered by the

Read more

Read More
MicrosoftSecurity

IGF proves the value of bottom-up, multi-stakeholder model in cyberspace policy-making

Credit to Author: Jenny Erie| Date: Mon, 29 Jan 2018 17:00:28 +0000

In December, the Internet Governance Forum (IGF) brought the world together to talk about the internet. I tend to take a definite interest in cybersecurity, but there were many more important topics discussed. They ranged from diversity in the technology sector through to philosophy in the digital age. Cybersecurity was, nonetheless, a major theme. My

Read more

Read More
MicrosoftSecurity

Now you see me: Exposing fileless malware

Credit to Author: Windows Defender ATP| Date: Wed, 24 Jan 2018 14:00:21 +0000

Attackers are determined to circumvent security defenses using increasingly sophisticated techniques. Fileless malware boosts the stealth and effectiveness of an attack, and two of last years major ransomware outbreaks (Petya and WannaCry) used fileless techniques as part of their kill chains. The idea behind fileless malware is simple: If tools already exist on a device

Read more

Read More
MicrosoftSecurity

Overview of rapid cyberattacks

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 23 Jan 2018 17:00:13 +0000

Rapid cyberattacks like Petya and WannaCrypt have reset our expectations on the speed and scope of damage that a cyberattack can inflict. The Microsoft Enterprise Cybersecurity Group Detection and Response team worked extensively to help customers respond to and recover from these kinds of attacks. In 2017, among the global enterprise customers that we worked

Read more

Read More