Uncategorized

MicrosoftSecurity

Tips for getting started on your security deployment

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 06 Mar 2018 19:00:32 +0000

This blog is part of a series that responds to common questions we receive from customers about how to most effectively deploy Microsoft 365 Security. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization. This past year, weve been listening to our customers questions about how to

Read more

Read More
QuickHealSecurity

Beware! A new .Net Ransomware is encrypting files with .Lime

Credit to Author: Bajrang Mane| Date: Tue, 06 Mar 2018 11:49:53 +0000

Cases of the “Lime ransomware” have been recently reported to Quick Heal Security Labs. Our research team has analyzed these cases deeply and found some useful information. This post shares this information to help users stay safe from ransomware attacks. ‘Lime’ is a newly discovered .net ransomware; it is also…

Read More
MicrosoftSecurity

The role that regions can and should play in critical infrastructure protection

Credit to Author: Jenny Erie| Date: Mon, 05 Mar 2018 19:00:28 +0000

Todays report, Critical Infrastructure Protection in Latin America and the Caribbean 2018, developed in partnership between Microsoft and the Organization of American States (OAS), demonstrates the value of regional cooperation in global efforts to increase the security of the online environment where it matters most. It acknowledges that rather than focusing on all politics is

Read more

Read More
MicrosoftSecurity

Best practices for securely moving workloads to Microsoft Azure

Credit to Author: Jenny Erie| Date: Mon, 26 Feb 2018 17:00:04 +0000

Azure is Microsofts cloud computing environment. It offers customers three primary service delivery models including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Adopting cloud technologies requires a shared responsibility model for security, with Microsoft responsible for certain controls and the customer others, depending on the service

Read more

Read More
QuickHealSecurity

Thanatos Ransomware – an analysis by Quick Heal Security Labs

Credit to Author: Shriram Munde| Date: Thu, 22 Feb 2018 09:04:02 +0000

Quick Heal Security Labs has come across a new ransomware with AES encryption technique that demands 0.01 Bitcoin as a ransom after encrypting the victim’s files. It’s known as Thanatos Ransomware. Thanatos is a type of a Trojan malware that spreads through malicious advertisements, phishing sites, spam emails, freeware and…

Read More
MicrosoftSecurity

How to mitigate rapid cyberattacks such as Petya and WannaCrypt

Credit to Author: Jenny Erie| Date: Wed, 21 Feb 2018 17:00:18 +0000

In the first blog post of this 3-part series, we introduced what rapid cyberattacks are and illustrated how rapid cyberattacks are different in terms of execution and outcome. In the second blog post, we provided some details on Petya and how it worked. In this final blog post, we will share: Microsofts roadmap of recommendations

Read more

Read More
MicrosoftSecurity

How a national cybersecurity agency can help avoid a national cybersecurity quagmire

Credit to Author: Jenny Erie| Date: Mon, 19 Feb 2018 17:00:04 +0000

This last October we saw more countries than ever participate in initiatives to raise cybersecurity awareness. What was once largely a US approach has evolved into events and initiatives around the world by governments, civil society groups, and private sector partners. This increased breadth and depth of activity reflects governments increased understanding of the importance

Read more

Read More
QuickHealSecurity

New Saturn Ransomware offers ransomware-as-a-service

Credit to Author: Shriram Munde| Date: Mon, 19 Feb 2018 17:05:19 +0000

Quick Heal Security Labs has come across a new ransomware called ‘Saturn’ currently doing the rounds which upon encryption appends “. Saturn” extension to the encrypted files.  Behaviour of Saturn Ransomware Upon arrival on the host machine, Saturn ransomware checks whether it is a virtual environment or has any debuggers….

Read More