Protecting Android clipboard content from unintended exposure

Credit to Author: Microsoft Security Threat Intelligence| Date: Mon, 06 Mar 2023 17:00:00 +0000

Microsoft discovered that the SHEIN Android application periodically read the contents of the Android device clipboard and, if a particular pattern was present, sent the contents of the clipboard to a remote server.

The post Protecting Android clipboard content from unintended exposure appeared first on Microsoft Security Blog.

Read more

New research, tooling, and partnerships for more secure AI and machine learning

Credit to Author: Microsoft Security Threat Intelligence – Editor| Date: Thu, 02 Mar 2023 16:00:00 +0000

At Microsoft, we’ve been working on the challenges and opportunities of AI for years. Today we’re sharing some recent developments so that the community can be better informed and better equipped for a new world of AI exploration.

The post New research, tooling, and partnerships for more secure AI and machine learning appeared first on Microsoft Security Blog.

Read more

2022 in review: DDoS attack trends and insights

Credit to Author: Microsoft Security Threat Intelligence| Date: Tue, 21 Feb 2023 18:00:00 +0000

With DDoS attacks becoming more frequent, sophisticated, and inexpensive to launch, it’s important for organizations of all sizes to be proactive and stay protected. In this blog, we detail trends and insights into DDoS attacks we observed and mitigated throughout 2022.

The post 2022 in review: DDoS attack trends and insights appeared first on Microsoft Security Blog.

Read more

Introducing kernel sanitizers on Microsoft platforms

Credit to Author: Microsoft Security Threat Intelligence – Editor| Date: Thu, 26 Jan 2023 17:00:00 +0000

We share technical details of our work on the AddressSanitizer (ASAN) and how it contributes to durably improving software quality and security at Microsoft.

The post Introducing kernel sanitizers on Microsoft platforms appeared first on Microsoft Security Blog.

Read more

Unraveling the techniques of Mac ransomware

Credit to Author: Microsoft Security Threat Intelligence – Editor| Date: Thu, 05 Jan 2023 17:00:00 +0000

Understanding how Mac ransomware works is critical in protecting today’s hybrid environments. We analyzed several known Mac ransomware families and highlighted these families’ techniques, which defenders can study further to prevent attacks.

The post Unraveling the techniques of Mac ransomware appeared first on Microsoft Security Blog.

Read more

Microsoft research uncovers new Zerobot capabilities

Credit to Author: Paul Oliveria| Date: Wed, 21 Dec 2022 20:00:00 +0000

The Microsoft Defender for IoT research team details information on the recent distribution of a Go-based botnet, known as Zerobot, that spreads primarily through IoT and web-application vulnerabilities.

The post Microsoft research uncovers new Zerobot capabilities appeared first on Microsoft Security Blog.

Read more

Gatekeeper’s Achilles heel: Unearthing a macOS vulnerability

Credit to Author: Microsoft Security Threat Intelligence| Date: Mon, 19 Dec 2022 18:00:00 +0000

Microsoft discovered a vulnerability in macOS, referred to as “Achilles”, allowing attackers to bypass application execution restrictions enforced by the Gatekeeper security mechanism.

The post Gatekeeper’s Achilles heel: Unearthing a macOS vulnerability appeared first on Microsoft Security Blog.

Read more

MCCrash: Cross-platform DDoS botnet targets private Minecraft servers

Credit to Author: Paul Oliveria| Date: Thu, 15 Dec 2022 18:00:00 +0000

The Microsoft Defender for IoT research team analyzed a cross-platform botnet that infects both Windows and Linux systems from PCs to IoT devices, to launch distributed denial of service (DDoS) attacks against private Minecraft servers.

The post MCCrash: Cross-platform DDoS botnet targets private Minecraft servers appeared first on Microsoft Security Blog.

Read more