Microsoft Secure

Microsoft Secure

Microsoft collaborates with Tenable to support federal cybersecurity efforts

In the spirit of the executive order and as part of our commitment to enhancing cybersecurity across the US, we today announce that Tenable has expanded its collaboration with the Microsoft Intelligent Security Association (MISA). Together, Microsoft and Tenable will help enhance the US government’s ability to quickly identify, investigate, prioritize, and remediate threats—and help collectively raise the country’s security posture.
The post Microsoft collaborates with Tenable to support federal cybersecurity efforts appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Using Python to unearth a goldmine of threat intelligence from leaked chat logs

Dealing with a great amount of data can be time consuming, thus using Python can be very powerful to help analysts sort information and extract the most relevant data for their investigation. The open-source tools library, MSTICpy, for example, is a Python tool dedicated to threat intelligence. It aims to help threat analysts acquire, enrich, analyze, and visualize data.
The post Using Python to unearth a goldmine of threat intelligence from leaked chat logs appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Secure access for a connected world—meet Microsoft Entra

Identity is not just about directories, and access is not just about the network. Security challenges have become much broader, so we need broader solutions. We need to secure access for every customer, partner, and employee—and for every microservice, sensor, network, device, and database.
The post Secure access for a connected world—meet Microsoft Entra appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Detecting and preventing privilege escalation attacks leveraging Kerberos relaying (KrbRelayUp)

The privilege escalation hacking tool KrbRelayUp is a wrapper that can streamline the use of some features in Rubeus, KrbRelay, SCMUACBypass, PowerMad/ SharpMad, Whisker, and ADCSPwn tools in attacks. Although this attack won’t function for Azure Active Directory (Azure AD) joined devices, hybrid joined devices with on-premises domain controllers remain vulnerable.
The post Detecting and preventing privilege escalation attacks leveraging Kerberos relaying (KrbRelayUp) appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Anatomy of a DDoS amplification attack

Amplification attacks are one of the most common distributed denial of service (DDoS) attack vectors. These attacks are typically categorized as flooding or volumetric attacks, where the attacker succeeds in generating more traffic than the target can process, resulting in exhausting its resources due to the amount of traffic it receives.
The post Anatomy of a DDoS amplification attack appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

How to improve risk management using Zero Trust architecture

Risk management plays a critical role in helping organizations with their security posture enhancement. Taking insider incidents as an example, they are not only costly to organizations but also time-consuming to be contained. As such, the ROI is maximized in effectively protecting the organizations’ assets as well as ensuring their business operations. Risk management is an ongoing activity. Are the long-established risk management programs in the enterprises staying on top of the evolving digital and threat landscapes?
The post How to improve risk management using Zero Trust architecture appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Beneath the surface: Uncovering the shift in web skimming

Web skimming campaigns now employ various obfuscation techniques to deliver and hide the skimming scripts. It’s a shift from earlier tactics where attackers conspicuously injected the malicious scripts into e-commerce platforms and content management systems (CMSs) via vulnerability exploitation, making this threat highly evasive to traditional security solutions.
The post Beneath the surface: Uncovering the shift in web skimming appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices

Observing a 254% increase in activity over the last six months from a versatile Linux trojan called XorDdos, the Microsoft 365 Defender research team provides in-depth analysis into this stealthy malware’s capabilities and key infection signs.
The post Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices appeared first on Microsoft Security Blog. READ MORE HERE…

Read More