{"id":18182,"date":"2022-02-03T07:00:33","date_gmt":"2022-02-03T15:00:33","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/03\/news-11915\/"},"modified":"2022-02-03T07:00:33","modified_gmt":"2022-02-03T15:00:33","slug":"news-11915","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/02\/03\/news-11915\/","title":{"rendered":"Cyber Signals: Defending against cyber threats with the latest research, insights, and trends"},"content":{"rendered":"<p><strong>Credit to Author: Emma Jones| Date: Thu, 03 Feb 2022 14:00:00 +0000<\/strong><\/p>\n<p>We\u2019re excited to&nbsp;introduce <a href=\"https:\/\/aka.ms\/cyber-signals\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Signals<\/a>,&nbsp;a cyber threat intelligence brief&nbsp;informed by the latest&nbsp;Microsoft&nbsp;threat data and&nbsp;research. This&nbsp;content, which will be released&nbsp;quarterly, offers&nbsp;an expert perspective into&nbsp;the current threat landscape,&nbsp;discussing&nbsp;trending tactics, techniques, and strategies used by the world\u2019s most prolific threat actors.&nbsp;As such, we hope it\u2019s a valuable resource to Chief Information Security Officers, Chief Information Officers, Chief Privacy Officers, and their teams, as they continue to evolve&nbsp;technologies, policies, and processes against the constantly changing threat landscape. At Microsoft, we believe that security is a team sport and that when we share what we\u2019re learning, we can all make the world a safer place.<\/p>\n<p>Cyber Signals aggregates insights&nbsp;we&nbsp;see&nbsp;from&nbsp;our research and&nbsp;security teams on the frontlines. This includes analysis from our 24 trillion security signals combined with intelligence we track by monitoring more than 40 nation-state groups and over 140 threat groups.&nbsp;In our first&nbsp;edition,&nbsp;we unpack&nbsp;the topic of&nbsp;identity.&nbsp;Our identities are made up of everything we say and do in our lives, recorded as data that spans across a sea of apps and services. While this delivers great utility, if we don\u2019t maintain good security hygiene our identities are at risk. And over the last year, we have seen identity become the battleground for security.<\/p>\n<p>While threats have been rising fast over the past two years, there has been low adoption\u00a0of strong identity authentication, such as <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/04\/05\/protect-your-business-from-email-phishing-with-multi-factor-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">multifactor authentication<\/a> (MFA) and\u00a0<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/09\/15\/the-passwordless-future-is-here-for-your-microsoft-account\/\" target=\"_blank\" rel=\"noreferrer noopener\">passwordless\u00a0solutions<\/a>.\u00a0For example, our research shows that\u00a0across industries,\u00a0only\u00a022\u00a0percent\u00a0of customers using Microsoft Azure Active Directory (Azure AD), Microsoft&#8217;s Cloud Identity Solution, have\u00a0implemented strong identity authentication protection\u00a0as of December 2021.\u00a0MFA and passwordless solutions can go a long way in preventing a variety of threats and we&#8217;re committed to educating customers on solutions such as these to better protect themselves. From January\u00a02021\u00a0through December 2021, we\u2019ve blocked\u00a0more than\u00a025.6\u00a0billion\u00a0Azure AD brute force authentication\u00a0attacks and intercepted\u00a035.7 billion phishing\u00a0emails\u00a0with Microsoft Defender for Office 365.<\/p>\n<p>With 8,500 security defenders protecting the platforms, tools, services, and endpoints that support our online lives, we\u2019re dedicated to thwarting advanced cyberattacks. At Microsoft, we understand our role in helping to protect and defend our most valuable digital asset, our identity. To ensure people are who they say they are when they access Microsoft accounts and services, we verify their identity<em>\u2014<\/em>but relying on a single password to authenticate users creates an attractive point of failure for hackers.<\/p>\n<p>Online&nbsp;threats&nbsp;are increasing in volume, velocity,&nbsp;and sophistication.&nbsp;From IoT to nation-state activity, new ransomware tactics to insights into the&nbsp;cybercriminal economy, Cyber Signals provides trend analysis and practical guidance&nbsp;to strengthen the first line of digital defense.&nbsp;With increasing numbers of people working remotely and accessing their business apps and data from multiple locations, including home offices, coworking spaces, and other remote locations, individuals are realizing the importance of secure authentication. And it\u2019s not just about securing enterprises, it\u2019s our personal data, devices, identities, platforms, and clouds that are also targets.<\/p>\n<h2>Learn more<\/h2>\n<p>With <a href=\"https:\/\/aka.ms\/cyber-signals\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Signals<\/a>, we\u2019ll share trends, tactics, and strategies threat actors use to gain access to the&nbsp;hardware&nbsp;and software that houses one\u2019s most sensitive data. We will also help inform the world on how, collectively, we can protect our most precious digital resources and our digital lives so we can build a safer world together.<\/p>\n<p>To learn more about Microsoft Security solutions&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">visit our website<\/a>. Bookmark the\u202f<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>\u202fto keep up with our expert coverage on security matters. Also, follow us at\u202f<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>\u202ffor the latest news and updates on cybersecurity.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/\">Cyber Signals: Defending against cyber threats with the latest research, insights, and trends<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Emma Jones| Date: Thu, 03 Feb 2022 14:00:00 +0000<\/strong><\/p>\n<p>We\u2019re excited to introduce Cyber Signals, a cyber threat intelligence brief informed by the latest Microsoft threat data and research. This content, which will be released quarterly, offers an expert perspective into the current threat landscape, discussing trending tactics, techniques, and strategies used by the world\u2019s most prolific threat actors.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/\">Cyber Signals: Defending against cyber threats with the latest research, insights, and trends<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500,22453],"class_list":["post-18182","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity","tag-microsoft-security-intelligence"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18182"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18182\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}