This Week in Security News: 5G Security and Tax Scams

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about cybersecurity and data concerns in 5G. Also, learn about cybercriminal threats during tax season. Read on: Securing Enterprises for 5G Connectivity For the advantages of…
The post This Week in Security News: 5G Security and Tax Scams appeared first on . Read More HERE…

Read more

Introducing the security configuration framework: A prioritized guide to hardening Windows 10

The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. We are defining discrete prescriptive Windows 10 security configurations (levels 5 through 1) to meet many of the common device scenarios we see today in the enterprise.
The post Introducing the security configuration framework: A prioritized guide to hardening Windows 10 appeared first on Microsoft Security. READ MORE HERE…

Read more

Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability

A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.
The post Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability appeared first on Microsoft Security. READ MORE HERE…

Read more

This Week in Security News: Instagram Hackers and Enterprise Threats

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how a group of hackers is stealing popular Instagram profiles. Also, learn about old and new cybersecurity issues inundated enterprises in 2018. Read on: Insecure VPNs:…
The post This Week in Security News: Instagram Hackers and Enterprise Threats appeared first on . Read More HERE…

Read more

Recommendations for deploying the latest Attack surface reduction rules for maximum impact

The keystone to good security hygiene is limiting your attack surface. Attack surface reduction is a technique to remove or constrain exploitable behaviors in your systems. In this blog, we discuss the two attack surface reduction rules introduced in the most recent release of Windows and cover suggested deployment methods and best practices. Software applications
Read more
The post Recommendations for deploying the latest Attack surface reduction rules for maximum impact appeared first on Microsoft Secure. READ MORE HERE…

Read more

Why the Pipeline Cybersecurity Initiative is a critical step

Working together with government to push a more coordinated effort around infrastructure securityparticularly pipelines and utilitiesis critical. The new Pipeline Cybersecurity Initiative will help ensure that additional resources, information-sharing, and coordination will help mitigate additional cyber-related risks against the U.S. energy industry in the coming years.
The post Why the Pipeline Cybersecurity Initiative is a critical step appeared first on Microsoft Secure. READ MORE HERE…

Read more