cybersecurity

MicrosoftSecurity

Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV

Credit to Author: Windows Defender Research| Date: Thu, 27 Sep 2018 16:00:24 +0000

Removing the need for files is the next progression of attacker techniques. While fileless techniques used to be employed almost exclusively in sophisticated cyberattacks, they are now becoming widespread in common malware, too.

The post Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV appeared first on Microsoft Secure.

Read More
MicrosoftSecurity

Delivering security innovation that puts Microsoft’s experience to work for you

Credit to Author: toddvanderark| Date: Mon, 24 Sep 2018 13:00:20 +0000

Cybersecurity is the central challenge of our digital age. Without it, everything from our personal email accounts and privacy to the way we do business, and all types of critical infrastructure, are under threat. As attackers evolve, staying ahead of these threats is getting harder. Microsoft can help. We focus on three areas: running security operations that work for you, building enterprise-class technology, and driving partnerships for a heterogeneous world. We can tip the scales in favor of the good guys and make the world a safer place.

The post Delivering security innovation that puts Microsoft’s experience to work for you appeared first on Microsoft Secure.

Read More
MicrosoftSecurity

Office VBA + AMSI: Parting the veil on malicious macros

Credit to Author: Microsoft Secure Blog Staff| Date: Wed, 12 Sep 2018 16:02:43 +0000

As part of our continued efforts to tackle entire classes of threats, Office 365 client applications now integrate with Antimalware Scan Interface (AMSI), enabling antivirus and other security solutions to scan macros and other scripts at runtime to check for malicious behavior. Macro-based threats have always been a prevalent entry point for malware, but we

Read more

The post Office VBA + AMSI: Parting the veil on malicious macros appeared first on Microsoft Secure.

Read More
MalwareBytesSecurity

Assessing the security of a portable router: a look inside its hardware

Credit to Author: Jean Taggart| Date: Mon, 10 Sep 2018 15:00:00 +0000

In this post, we acquire the necessary equipment to analyze the security of an inexpensive portable router, which we access through its diagnostic interface, and poke around inside.

Categories:

Tags:

(Read more…)

The post Assessing the security of a portable router: a look inside its hardware appeared first on Malwarebytes Labs.

Read More