Microsoft Secure

Microsoft Secure

Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability

A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.
The post Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability appeared first on Microsoft Security. READ MORE HERE…

Read More
Microsoft Secure

Step 8. Protect your documents and email: top 10 actions to secure your environment

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 8. Protect your documents and email,” you’ll learn how to deploy Azure Information Protection and use Office 365 Advanced Threat Protection (ATP) and Exchange Online Protection to help secure your documents and emails.
The post Step 8. Protect your documents and email: top 10 actions to secure your environment appeared first on Microsoft Security. READ MORE HERE…

Read More
Microsoft Secure

Steer clear of tax scams

In the month of February, we saw an average of 300,000 phishing attempts across Microsoft’s browsing platforms daily. Our security experts expect these attempted scams to become increasingly more prevalent through the April 15 tax day.
The post Steer clear of tax scams appeared first on Microsoft Security. READ MORE HERE…

Read More
Microsoft Secure

Recommendations for deploying the latest Attack surface reduction rules for maximum impact

The keystone to good security hygiene is limiting your attack surface. Attack surface reduction is a technique to remove or constrain exploitable behaviors in your systems. In this blog, we discuss the two attack surface reduction rules introduced in the most recent release of Windows and cover suggested deployment methods and best practices. Software applications
Read more
The post Recommendations for deploying the latest Attack surface reduction rules for maximum impact appeared first on Microsoft Secure. READ MORE HERE…

Read More
Microsoft Secure

Why the Pipeline Cybersecurity Initiative is a critical step

Working together with government to push a more coordinated effort around infrastructure securityparticularly pipelines and utilitiesis critical. The new Pipeline Cybersecurity Initiative will help ensure that additional resources, information-sharing, and coordination will help mitigate additional cyber-related risks against the U.S. energy industry in the coming years.
The post Why the Pipeline Cybersecurity Initiative is a critical step appeared first on Microsoft Secure. READ MORE HERE…

Read More
Microsoft Secure

Step 5. Set up mobile device management: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 5. Set up mobile device management, youll learn how to plan your Microsoft Intune deployment and set up Mobile Device Management (MDM) as part of your Unified Endpoint Management (UEM) strategy.
The post Step 5. Set up mobile device management: top 10 actions to secure your environment appeared first on Microsoft Secure. READ MORE HERE…

Read More