Microsoft Secure

Microsoft Secure

The five-day job: A BlackByte ransomware intrusion case study

In a recent investigation by Microsoft Incident Response of a BlackByte 2.0 ransomware attack, we found that the threat actor progressed through the full attack chain, from initial access to impact, in less than five days, causing significant business disruption for the victim organization.
The post The five-day job: A BlackByte ransomware intrusion case study appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Microsoft Defender for Endpoint is ranked number one in market share in the IDC Worldwide Corporate Endpoint Security Market Shares report, 2022

Today, we are proud to share that Microsoft is ranked number one in market share in the IDC Worldwide Corporate Endpoint Security Market Shares report, 2022. More customers choose and trust Microsoft Defender for Endpoint and Microsoft Defender for Business to defend their multiplatform devices than any other vendor.
The post Microsoft Defender for Endpoint is ranked number one in market share in the IDC Worldwide Corporate Endpoint Security Market Shares report, 2022 appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Microsoft at NICE Conference: Resetting expectations and enabling diversity in the cybersecurity workforce

With the skills gap in cybersecurity professionals, Microsoft is helping attract new generations of diversified talent to the field, including leading discussions at the 2023 NICE Conference.
The post Microsoft at NICE Conference: Resetting expectations and enabling diversity in the cybersecurity workforce appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Why endpoint management is key to securing an AI-powered future

With the coming wave of AI, this is precisely the time for organizations to prepare for the future. To be properly ready for AI, Zero Trust principles take on new meaning and scope. The right endpoint management strategy can help provide the broadest signal possible and make your organization more secure and productive for years to come.
The post Why endpoint management is key to securing an AI-powered future appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

IoT devices and Linux-based systems targeted by OpenSSH trojan campaign

Microsoft has uncovered an attack leveraging custom and open-source tools to target internet-facing IoT devices and Linux-based systems. The attack involves deploying a patched version of OpenSSH on affected devices to allow root login and the hijack of SSH credentials.
The post IoT devices and Linux-based systems targeted by OpenSSH trojan campaign appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Cadet Blizzard emerges as a novel and distinct Russian threat actor

Microsoft attributes several campaigns to a distinct Russian state-sponsored threat actor tracked as Cadet Blizzard (DEV-0586), including the WhisperGate destructive attack, Ukrainian website defacements, and the hack-and-leak front “Free Civilian”.
The post Cadet Blizzard emerges as a novel and distinct Russian threat actor appeared first on Microsoft Security Blog. READ MORE HERE…

Read More