New browser extensions for integrating Microsoft’s hardware-based isolation

The hardware-based isolation technology on Windows 10 that allows Microsoft Edge to isolate browser-based attacks is now available as a browser extension for Google Chrome and Mozilla Firefox.
The post New browser extensions for integrating Microsoft’s hardware-based isolation appeared first on Microsoft Security. READ MORE HERE…

Read more

Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices

Malice Vs Greed Most discussion about security in the supply chain has been focused on detecting tampering, or preventing backdoors or sneaky things being inserted into components and software. There’s another aspect emerging and will dwarf the tampering: devices that are counterfeited for profit indirectly causing security problems. Counterfeit devices are ones that either by…
The post Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices appeared first on . Read More HERE…

Read more

Oversharing and safety in the age of social media

So how do you protect yourself from theft of personal or proprietary company information in public? The super obvious, somewhat flippant answer is: don’t share any of this type of information in public. But, at times, this is easier said than done. If you travel as much as I do, it becomes impossible to refrain from conducting some confidential business whilst you are on the road. So how do you actually protect yourself?
The post Oversharing and safety in the age of social media appeared first on Microsoft Security. READ MORE HERE…

Read more

This Week in Security News: 5G Security and Tax Scams

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about cybersecurity and data concerns in 5G. Also, learn about cybercriminal threats during tax season. Read on: Securing Enterprises for 5G Connectivity For the advantages of…
The post This Week in Security News: 5G Security and Tax Scams appeared first on . Read More HERE…

Read more

Introducing the security configuration framework: A prioritized guide to hardening Windows 10

The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. We are defining discrete prescriptive Windows 10 security configurations (levels 5 through 1) to meet many of the common device scenarios we see today in the enterprise.
The post Introducing the security configuration framework: A prioritized guide to hardening Windows 10 appeared first on Microsoft Security. READ MORE HERE…

Read more

Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability

A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.
The post Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability appeared first on Microsoft Security. READ MORE HERE…

Read more

This Week in Security News: Instagram Hackers and Enterprise Threats

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how a group of hackers is stealing popular Instagram profiles. Also, learn about old and new cybersecurity issues inundated enterprises in 2018. Read on: Insecure VPNs:…
The post This Week in Security News: Instagram Hackers and Enterprise Threats appeared first on . Read More HERE…

Read more

Recommendations for deploying the latest Attack surface reduction rules for maximum impact

The keystone to good security hygiene is limiting your attack surface. Attack surface reduction is a technique to remove or constrain exploitable behaviors in your systems. In this blog, we discuss the two attack surface reduction rules introduced in the most recent release of Windows and cover suggested deployment methods and best practices. Software applications
Read more
The post Recommendations for deploying the latest Attack surface reduction rules for maximum impact appeared first on Microsoft Secure. READ MORE HERE…

Read more