cybersecurity

MicrosoftSecurity

How one senior developer brings the startup spirit to Microsoft

Credit to Author: Christine Barrett| Date: Wed, 27 Apr 2022 16:00:00 +0000

Igor Sakhnov, corporate vice president of Identity and Network Access Engineering, talks with software engineer George Maina about his entrepreneurial journey and the beginnings of the Microsoft Africa Development Center in Kenya.

The post How one senior developer brings the startup spirit to Microsoft appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn

Credit to Author: Katie McCafferty| Date: Tue, 26 Apr 2022 16:00:00 +0000

Microsoft has discovered several vulnerabilities, collectively referred to as Nimbuspwn, that could be chained together, allowing an attacker to elevate privileges to root on many Linux desktop endpoints. Leveraging Nimbuspwn as a vector for root access could allow attackers to achieve greater impact on vulnerable devices by deploying payloads and performing other malicious actions via arbitrary root code execution.

The post Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Microsoft best practices for managing IoT security concerns

Credit to Author: Christine Barrett| Date: Mon, 25 Apr 2022 16:00:00 +0000

The Internet of Things, or IoT, has expanded beyond the mere concept that it was when first introduced. IoT is now part of most individuals’ daily activities, from smart speakers and thermostats to smartwatches and vehicles. IoT devices and systems bring massive convenience and functionality. However, due to the complicated nature of IoT, when implementing and managing IoT, security must be top of mind.

The post Microsoft best practices for managing IoT security concerns appeared first on Microsoft Security Blog.

Read More
ScadaICSSchneider

Creating More Resilient Energy Infrastructure through Cybersecurity Collaboration

Credit to Author: Annette Clayton| Date: Wed, 20 Apr 2022 15:08:26 +0000

Today, we find ourselves in the most challenging business environment of our lives. Multinational businesses thrive on certainty and predictability. But in the last several years, we’ve endured a barrage… Read more »

The post Creating More Resilient Energy Infrastructure through Cybersecurity Collaboration appeared first on Schneider Electric Blog.

Read More
MicrosoftSecurity

The future of compliance and data governance is here: Introducing Microsoft Purview

Credit to Author: Emma Jones| Date: Tue, 19 Apr 2022 17:00:00 +0000

Hybrid work has connected us in ways unimaginable just two years ago. Today we routinely communicate across continents while collaborating in real-time. Protecting a decentralized hybrid work environment requires strong solutions built around clear principles designed to defend customers’ data, safeguard employees, and protect the business.

The post The future of compliance and data governance is here: Introducing Microsoft Purview appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

A clearer lens on Zero Trust security strategy: Part 1

Credit to Author: Christine Barrett| Date: Thu, 14 Apr 2022 18:00:00 +0000

Today’s world is flooded with definitions and perspectives on Zero Trust, so we are kicking off a blog series to bring clarity to what Zero Trust is and means. This first blog will draw on the past, present, and future to bring a clear vision while keeping our feet planted firmly on the ground of reality.

The post A clearer lens on Zero Trust security strategy: Part 1 appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Dismantling ZLoader: How malicious ads led to disabled security tools and ransomware

Credit to Author: Paul Oliveria| Date: Wed, 13 Apr 2022 16:00:00 +0000

Microsoft took action against the ZLoader trojan by working with telecommunications providers around the world to disrupt key ZLoader infrastructure. In this blog, we detail the various characteristics for identifying ZLoader activity, including its associated tactics, recent campaigns, and affiliated payloads, such as ransomware.

The post Dismantling ZLoader: How malicious ads led to disabled security tools and ransomware appeared first on Microsoft Security Blog.

Read More