{"id":19945,"date":"2022-08-25T09:01:13","date_gmt":"2022-08-25T17:01:13","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/08\/25\/news-13678\/"},"modified":"2022-08-25T09:01:13","modified_gmt":"2022-08-25T17:01:13","slug":"news-13678","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/08\/25\/news-13678\/","title":{"rendered":"Microsoft Security highlights from Black Hat USA 2022"},"content":{"rendered":"<p><strong>Credit to Author: Christine Barrett| Date: Thu, 25 Aug 2022 16:00:00 +0000<\/strong><\/p>\n<p>Black Hat USA 2022 marked the twenty-fifth year that security researchers, security architects, and other security professionals have gathered to share the latest research, developments, and trends. Microsoft was among the companies participating in the conference, which was from August 6 to 11, 2022, in Las Vegas, Nevada. This year\u2019s event was hybrid, with some attendees attending in-person and others joining online.<\/p>\n<p>We were excited to join members of the Black Hat security community representing 111 countries.<sup>1<\/sup> Along with more than 17,000 in-person attendees\u2014and more than 15,000 virtual attendees\u2014we heard security insights and shared the latest in <a href=\"https:\/\/www.microsoft.com\/security\/\">Microsoft Security solutions<\/a>, including <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/08\/02\/microsoft-announces-new-solutions-for-threat-intelligence-and-attack-surface-management\">two new security solutions<\/a>\u2014Microsoft Defender Threat Intelligence to track threat actor activity and Microsoft Defender External Attack Surface Management to discover unknown and unmanaged resources that are visible and accessible from the internet.<\/p>\n<h2>Booth excitement<\/h2>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"682\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture2-1024x682.jpg\" alt=\"A picture of the Microsoft Security booth at the Black Hat USA 2022 Conference.\" class=\"wp-image-120416\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture2-1024x682.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture2-300x200.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture2-768x512.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture2-293x195.jpg 293w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture2.jpg 1261w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<p>What energizes us the most about conferences like Black Hat is the opportunity to meet people. During the conference, we welcomed hundreds of security professionals to our booth. There, we talked about cybersecurity threats, shared our perspective on the need for comprehensive security, listened to their stories of cybersecurity challenges, and gave them demonstrations of the latest innovations from Microsoft Security in the threat intelligence and protection space, including <a href=\"https:\/\/www.microsoft.com\/security\/business\/services\/microsoft-defender-experts-hunting\">Microsoft Defender Experts for Hunting<\/a>.<\/p>\n<p>We\u2019re passionate about security and it\u2019s always a thrill to be among others who feel the same way. Our team in the booth was kept happily busy. Some attendees chatted in groups of two or more while others crowded around four demo stations\u2014<a href=\"https:\/\/www.microsoft.com\/security\/business\/services\">Microsoft Security Experts<\/a>, <a href=\"https:\/\/www.microsoft.com\/security\/business\/threat-protection\">threat protection<\/a>, <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-threat-intelligence\">threat intelligence<\/a>, and <a href=\"https:\/\/www.microsoft.com\/security\/business\/solutions\/identity-access\">identity and access management<\/a>\u2014to see how Microsoft product solutions can help catch what others miss.<\/p>\n<p>During our Diversity and Inclusion Hour on Wednesday, Black Hat attendees gathered in the Microsoft booth to socialize and talk about diversity, equality, and inclusion in the workplace. As a bonus, Microsoft enlisted a professional photographer to take headshots for anyone who attended and wanted to update their LinkedIn profiles.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"683\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture3-1024x683.jpg\" alt=\"A group of people having a conversation in the circle.\" class=\"wp-image-120419\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture3-1024x683.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture3-300x200.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture3-768x512.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture3-293x195.jpg 293w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture3.jpg 1283w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<h2>Conference sessions<\/h2>\n<p>Microsoft Security team members stay up on the latest news, solutions, and strategies in the security world. We were thrilled when several of these security professionals received the opportunity to share their thought leadership insights with Black Hat attendees.<\/p>\n<ul>\n<li><strong>\u201cAdvancing Investigations with Threat Intelligence\u201d: <\/strong>Microsoft Incident Response Consultant MacKenzie Brown shared how Microsoft\u2019s Detection and Response Team (DART) harnesses the power of threat intelligence while in the trenches helping customers challenged by cyberattacks. MacKenzie also walked through how DART responded to recent threats from the North Korean nation-state actor believed to be behind HolyGh0st and Lapus$. 163 attendees viewed the session virtually.<\/li>\n<li><strong>\u201cAAD Joined Machines\u2014The New Lateral Movement\u201d:<\/strong> Microsoft Senior Security Researcher Mor Rubin talked about new research about a mechanism designed to allow authentication between <a href=\"https:\/\/azure.microsoft.com\/services\/active-directory\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Azure Active Directory<\/a>-joined machines. Mor also explored the foundation of the new network protocol, presented a way (and a tool) to perform pass-the-certificate attacks, and talked through an open-source solution that can help companies hunt for attacks.<\/li>\n<li><strong>\u201cCastGuard: Mitigating Type Confusion in C++\u201d:<\/strong> Microsoft Software Security Engineer Joe Bialek discussed type confusion vulnerabilities, which have incredibly powerful primitives to exploit writers. Joe introduced a new mitigation called CastGuard that\u2019s being deployed to a set of Windows components (with more in the works). With a tiny instruction sequence and the virtual function table pointer of an object, CastGuard helps prevent illegal static down-casts in C++ code.<\/li>\n<li>\u201c<strong>Malware Classification With Machine Learning Enhanced by Windows Kernel Emulation\u201d:<\/strong> Microsoft Security Software Engineer Dmitrijs Trizna presented a hybrid machine learning architecture that combines static and dynamic malware analysis methodologies. This architecture surpasses the capabilities of the modern AI classifiers and records a detection rate of 96.7 percent with a fixed false positive rate of 0.1 percent.<\/li>\n<\/ul>\n<h2>Conference social events<\/h2>\n<p>It wouldn\u2019t be a conference without plenty of fun social events to get everyone chatting, networking, and celebrating the achievements of security professionals. At the Cybersecurity Women of the Year Awards (CSWY Awards) on August 9, 2022, attendees gathered at the Luxor, enjoyed a gourmet meal, and toasted to female cybersecurity and privacy leaders who are changing the world.<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture4-682x1024.jpg\" alt=\"Aanchal Gupta, CVP of Engineering at Microsoft is announcing a winner.\" class=\"wp-image-120422\" width=\"341\" height=\"512\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture4-682x1024.jpg 682w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture4-200x300.jpg 200w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture4.jpg 734w\" sizes=\"auto, (max-width: 341px) 100vw, 341px\" \/><\/figure>\n<p>\u201cThe CSWY Awards recognize women protecting businesses, schools, and governments from cyber threats actors,\u201d said Carmen Marsh, creator of the CSWY Awards. \u201cWe give security pros the opportunity to talk about what\u2019s happening or not happening in cybersecurity and how to make it better. It\u2019s wonderful to bring women from around the world to Las Vegas for this important event while creating inspiring role models for the new generation of cybersecurity professionals.\u201d<\/p>\n<p>As a Signature Sponsor, Microsoft was honored to recognize three barrier breakers serving as role models for future generations of cybersecurity professionals. Microsoft Corporate Vice President of Cloud and Microsoft 365 Security, Aanchal Gupta gave out the Cybersecurity Woman Privacy Woman Law Professional of the Year 2022 award, while Microsoft Senior Director of Security Narrative and Strategy, Shelli Strand awarded the Cybersecurity Woman Influencer of the Year 2022 award. Abhilasha Bhargav-Spantzel, Microsoft Partner Security Architect, gave out the Cybersecurity Woman Volunteer of the Year award.<\/p>\n<p>After dinner and the awards ceremony, attendees networked and danced to a DJ spinning hits.<\/p>\n<p>\u201cToday, we have an incredible opportunity to attract a talented and impassioned generation of defenders and to change the deep gender disparity in our industry. I am so grateful to the Cybersecurity Woman of the Year program organizers for spotlighting the amazing work being done by those superheroes who are setting a powerful example for us all,\u201d said Vasu Jakkal, Microsoft Corporate Vice President of Security, Compliance, Identity, Management, and Privacy, \u201cMicrosoft is proud to take part in an event that is helping to cultivate inclusivity, inspire and facilitate mentorship, and celebrate the important field of cybersecurity.\u201d<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"682\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture5-1024x682.jpg\" alt=\"\" class=\"wp-image-120425\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture5-1024x682.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture5-300x200.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture5-768x512.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture5-293x195.jpg 293w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture5.jpg 1334w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<p>On August 10, 2022, <a href=\"https:\/\/www.microsoft.com\/msrc\">Microsoft Security Response Center<\/a> (MSRC) hosted Microsoft\u2019s annual Researcher Celebration event at the Illuminarium in Las Vegas, Nevada. The event brought together some of Microsoft\u2019s Most Valuable Researchers (MVRs), and many security leaders and professionals. Attendees met with the head of MSRC, Aanchal Gupta, MSRC leadership, and other key Microsoft attendees to thank the MVRs and researcher community for their contributions. Check out the list of <a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/08\/08\/congratulations-to-the-msrc-2022-most-valuable-researchers\/\" target=\"_blank\" rel=\"noreferrer noopener\">MSRC 2022 Most Valuable Researchers<\/a>!<\/p>\n<p>Throughout the evening, more than 500 guests from more than 200 organizations across the information security community participated in space-themed activities and experiences while connecting and re-connecting in person for the first time in many years. Thanks to everyone that attended and helped make the event memorable.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"576\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture7-1024x576.jpg\" alt=\"Collage of images showing people at the different experiences at Microsoft\u2019s annual Researcher Celebration event at the Illuminarium in Las Vegas.\" class=\"wp-image-120437\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture7-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture7-300x169.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture7-768x432.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture7-687x385.jpg 687w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture7-1083x609.jpg 1083w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture7-767x431.jpg 767w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture7-539x303.jpg 539w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/08\/Picture7.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<h2>More threat intelligence resources<\/h2>\n<p>We can\u2019t wait for future opportunities to connect with everyone again in person. Until then, there are a few ways for you to stay connected and up to date on the latest from Microsoft in threat intelligence solutions:<\/p>\n<ul>\n<li>Join us on September 15, 2022, for the free digital event <a href=\"https:\/\/msthreatintelligencedigitalevent.eventcore.com\/?ocid=cmmlrcx1zub\" target=\"_blank\" rel=\"noreferrer noopener\">Stop Ransomware with Microsoft Security<\/a> to hear key insights from Microsoft&#8217;s leadership, including a fireside conversation between Charlie Bell, Executive Vice President of Microsoft Security, and Vasu Jakkal, Corporate Vice President of Microsoft Security, Compliance, Identity, and Privacy Business.<\/li>\n<li>Explore details on Microsoft\u2019s threat intelligence solution in our <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/08\/02\/microsoft-announces-new-solutions-for-threat-intelligence-and-attack-surface-management\/\">blog post<\/a> about new solutions for threat intelligence and attack surface management.<\/li>\n<li>Check out the latest <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/08\/22\/cyber-signals-defend-against-the-new-ransomware-landscape\/\">Cyber Signals report<\/a>.<\/li>\n<li>If you attended Black Hat and interacted with Microsoft, please <a href=\"https:\/\/forms.office.com\/r\/3Ymu9KeZeP\" target=\"_blank\" rel=\"noreferrer noopener\">share your feedback<\/a> with us.&nbsp;<\/li>\n<\/ul>\n<p>To learn more about Microsoft Security solutions,\u00a0<a href=\"https:\/\/www.microsoft.com\/security\/business\/solutions\">visit our\u00a0website<\/a>.\u00a0Bookmark the\u00a0<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/apnews.com\/press-release\/business-wire\/technology-las-vegas-957374f62ecb4dd9a883b7fbe77b4b8f\" target=\"_blank\" rel=\"noreferrer noopener\">Black Hat USA 2022 Closes on a Record Breaking Event in Las Vegas &amp; Online<\/a>, AP News. August 19, 2022.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/08\/25\/microsoft-security-highlights-from-black-hat-usa-2022\/\">Microsoft Security highlights from Black Hat USA 2022<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/08\/25\/microsoft-security-highlights-from-black-hat-usa-2022\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christine Barrett| Date: Thu, 25 Aug 2022 16:00:00 +0000<\/strong><\/p>\n<p>Black Hat USA 2022 marked the twenty-fifth year that security researchers, security architects, and other security professionals have gathered to share the latest research, developments, and trends. Here are the highlights from the Microsoft Security booth.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/08\/25\/microsoft-security-highlights-from-black-hat-usa-2022\/\">Microsoft Security highlights from Black Hat USA 2022<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500],"class_list":["post-19945","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19945"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19945\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}