Cybersecurity

Microsoft Secure

Rewards plus: Fake mobile banking rewards apps lure users to install info-stealing RAT on Android devices

A fake mobile banking rewards app delivered through a link in an SMS campaign has been making the rounds, targeting customers of Indian banking institutions. Users who install the mobile app are unknowingly installing an Android malware with remote access trojan (RAT) capabilities.
The post Rewards plus: Fake mobile banking rewards apps lure users to install info-stealing RAT on Android devices appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Test your team’s security readiness with the Gone Phishing Tournament

In partnership with Microsoft, Terranova created the Gone Phishing Tournament, an online phishing initiative that uses real-world simulations to establish accurate phishing clickthrough rates and additional benchmarking statistics for user behaviors.
The post Test your team’s security readiness with the Gone Phishing Tournament appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Implementing a Zero Trust strategy after compromise recovery

After a compromise recovery follows what we call a Security Strategic Recovery. This is the plan for moving forward to get up to date with security posture all over the environment. The plan consists of different components like securing privileged access and extended detection and response, but it all points in the same direction: moving ahead with Zero Trust Strategy over traditional network-based security.
The post Implementing a Zero Trust strategy after compromise recovery appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

Secure your endpoints with Transparity and Microsoft

When it comes to cybersecurity, the ability to normalize and correlate disparate logs from different devices, appliances, and resources is key, as is the ability to react quickly when under attack. In this blog post, we explore the importance of EPP as an essential component in your security strategy.
The post Secure your endpoints with Transparity and Microsoft appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure

The art and science behind Microsoft threat hunting: Part 1

At Microsoft, we define threat hunting as the practice of actively looking for cyberthreats that have covertly (or not so covertly) penetrated an environment. This involves looking beyond the known alerts or malicious threats to discover new potential threats and vulnerabilities.
The post The art and science behind Microsoft threat hunting: Part 1 appeared first on Microsoft Security Blog. READ MORE HERE…

Read More