cybersecurity

MicrosoftSecurity

New browser extensions for integrating Microsoft’s hardware-based isolation

Credit to Author: Eric Avena| Date: Thu, 23 May 2019 15:50:07 +0000

The hardware-based isolation technology on Windows 10 that allows Microsoft Edge to isolate browser-based attacks is now available as a browser extension for Google Chrome and Mozilla Firefox. We introduced the container technology in 2017. Since then, we have been evolving the technology and engaging with customers to understand how hardware-based isolation can best help…

The post New browser extensions for integrating Microsoft’s hardware-based isolation appeared first on Microsoft Security.

Read More
MicrosoftSecurity

Detecting credential theft through memory access modelling with Microsoft Defender ATP

Credit to Author: Eric Avena| Date: Thu, 09 May 2019 17:29:45 +0000

Microsoft Defender ATP instruments memory-related function calls such as VirtualAlloc and VirtualProtect to catch in-memory attack techniques like reflective DLL loading. The same signals can also be used to generically detect malicious credential dumping activities performed by a wide range of different individual tools.

The post Detecting credential theft through memory access modelling with Microsoft Defender ATP appeared first on Microsoft Security.

Read More
ScadaICSSchneider

Real Estate:  How to Manage Cybersecurity Risk in Smart Buildings

Credit to Author: Annick Villeneuve| Date: Tue, 07 May 2019 20:34:08 +0000

Cybersecurity in smart buildings There is no question, smart buildings are becoming more commonplace in today’s real estate portfolios, and cybersecurity is a critical consideration.  In an in-depth, 2 part… Read more »

The post Real Estate:  How to Manage Cybersecurity Risk in Smart Buildings appeared first on Schneider Electric Blog.

Read More
SecurityTrendMicro

Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Tue, 07 May 2019 13:00:28 +0000

Malice Vs Greed Most discussion about security in the supply chain has been focused on detecting tampering, or preventing backdoors or sneaky things being inserted into components and software. There’s another aspect emerging and will dwarf the tampering: devices that are counterfeited for profit indirectly causing security problems. Counterfeit devices are ones that either by…

The post Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: 5G Security and Tax Scams

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 12 Apr 2019 14:00:11 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about cybersecurity and data concerns in 5G. Also, learn about cybercriminal threats during tax season. Read on: Securing Enterprises for 5G Connectivity For the advantages of…

The post This Week in Security News: 5G Security and Tax Scams appeared first on .

Read More
MicrosoftSecurity

Introducing the security configuration framework: A prioritized guide to hardening Windows 10

Credit to Author: Eric Avena| Date: Thu, 11 Apr 2019 15:00:41 +0000

The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. We are defining discrete prescriptive Windows 10 security configurations (levels 5 through 1) to meet many of the common device scenarios we see today in the enterprise.

The post Introducing the security configuration framework: A prioritized guide to hardening Windows 10 appeared first on Microsoft Security.

Read More
MicrosoftSecurity

Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability

Credit to Author: Eric Avena| Date: Wed, 10 Apr 2019 15:00:58 +0000

A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.

The post Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability appeared first on Microsoft Security.

Read More