Stopping Carbanak+FIN7: How Microsoft led in the MITRE Engenuity® ATT&CK® Evaluation

Credit to Author: Lauren Goodwin| Date: Wed, 05 May 2021 22:00:03 +0000

In MITRE Engenuity’s recent Carbanak+FIN7 ATT&CK Evaluation, Microsoft demonstrated that we can stop advanced, real-world attacks by threat actor groups with our industry-leading security capabilities. In this year’s evaluation, we engaged our unified Microsoft 365 Defender stack, with market-leading capabilities in Microsoft Defender for Endpoint and Microsoft Defender for Identity collaborating to provide: Best overall…

The post Stopping Carbanak+FIN7: How Microsoft led in the MITRE Engenuity® ATT&CK® Evaluation appeared first on Microsoft Security.

Read more

Digital Defense integrates with Microsoft to detect attacks missed by traditional endpoint security

Credit to Author: Lauren Goodwin| Date: Tue, 08 Dec 2020 17:00:42 +0000

Cybercriminals have ramped up their initial compromises through phishing and pharming attacks using a variety of tools and tactics that, while numerous, are simple and can often go undetected.

The post Digital Defense integrates with Microsoft to detect attacks missed by traditional endpoint security appeared first on Microsoft Security.

Read more

Zerologon is now detected by Microsoft Defender for Identity

Credit to Author: Lauren Goodwin| Date: Mon, 30 Nov 2020 17:00:20 +0000

There has been a huge focus on the recently patched CVE-2020-1472 Netlogon Elevation of Privilege vulnerability, widely known as ZeroLogon. While Microsoft strongly recommends that you deploy the latest security updates to your servers and devices, we also want to provide you with the best detection coverage possible for your domain controllers. Microsoft Defender for…

The post Zerologon is now detected by Microsoft Defender for Identity appeared first on Microsoft Security.

Read more

Why integrated phishing-attack training is reshaping cybersecurity—Microsoft Security

Credit to Author: Teri Seals-Dormer| Date: Mon, 05 Oct 2020 16:00:05 +0000

Phishing is still one of the most significant risk vectors facing enterprises today. Innovative email security technology like Microsoft Defender for Office 365 stops a majority of phishing attacks before they hit user inboxes, but no technology in the world can prevent 100 percent of phishing attacks from hitting user inboxes. At that point in…

The post Why integrated phishing-attack training is reshaping cybersecurity—Microsoft Security appeared first on Microsoft Security.

Read more

Microsoft delivers unified SIEM and XDR to modernize security operations

Credit to Author: Jim Flack| Date: Tue, 22 Sep 2020 14:57:39 +0000

The new Microsoft Defender is the most comprehensive XDR in the market today and prevents, detects, and responds to threats across identities, endpoints, applications, email, IoT, infrastructure, and cloud platforms.

The post Microsoft delivers unified SIEM and XDR to modernize security operations appeared first on Microsoft Security.

Read more

Microsoft announces cloud innovation to simplify security, compliance, and identity

Credit to Author: Jim Flack| Date: Tue, 22 Sep 2020 14:57:24 +0000

Simplifying security, compliance, and identity: Announcing Microsoft Defender, enhancements to Data Loss Prevention, and decentralized identity pilots

The post Microsoft announces cloud innovation to simplify security, compliance, and identity appeared first on Microsoft Security.

Read more

3 ways Microsoft 365 can help you reduce helpdesk costs

Credit to Author: Jim Flack| Date: Thu, 03 Sep 2020 16:00:32 +0000

Microsoft 365 Security is an integrated solution that helps you strengthen security, enhance productivity, and reduce costs.

The post 3 ways Microsoft 365 can help you reduce helpdesk costs appeared first on Microsoft Security.

Read more

Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning

Credit to Author: Eric Avena| Date: Thu, 27 Aug 2020 16:00:27 +0000

Microsoft Defender ATP leverages AMSI’s visibility into scripts and harnesses the power of machine learning to detect and stop post-exploitation activities that largely rely on scripts.

The post Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning appeared first on Microsoft Security.

Read more