DDoS attack on US Health agency part of coordinated campaign

Credit to Author: John E Dunn| Date: Wed, 18 Mar 2020 11:54:20 +0000

It coincided with a disinformation campaign carried out via SMS, email and social media claiming that national quarantine was imminent.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/eIFGE7W8MpI” height=”1″ width=”1″ alt=””/>

Read more

Human traffickers use social media oversharing to gain victims’ trust

Credit to Author: Lisa Vaas| Date: Wed, 18 Mar 2020 10:57:24 +0000

Posts about money or family trouble are being used to gain trust by those who force victims into sex work or slavery, the FBI warns.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/HfUZ3TW3ABg” height=”1″ width=”1″ alt=””/>

Read more

Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks

Credit to Author: Eric Avena| Date: Tue, 17 Mar 2020 16:00:49 +0000

Secured-core PCs combine virtualization, operating system, and hardware and firmware protection. Along with Microsoft Defender ATP, Secured-core PCs provide end-to-end protection against advanced attacks that leverage driver vulnerabilities to gain kernel privileges.

The post Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks appeared first on Microsoft Security.

Read more

Work remotely, stay secure—guidance for CISOs

Credit to Author: Todd VanderArk| Date: Thu, 12 Mar 2020 16:00:48 +0000

With many employees suddenly working from home, there are things an organization and employees can do to help remain productive without increasing cybersecurity risk.

The post Work remotely, stay secure—guidance for CISOs appeared first on Microsoft Security.

Read more

Empower Firstline Workers with Azure AD and YubiKey passwordless authentication

Credit to Author: Todd VanderArk| Date: Thu, 12 Mar 2020 16:00:37 +0000

The integration of FIDO2-based YubiKeys and Azure Active Directory (Azure AD) is a game changer.

The post Empower Firstline Workers with Azure AD and YubiKey passwordless authentication appeared first on Microsoft Security.

Read more

Guarding against supply chain attacks—Part 3: How software becomes compromised

Credit to Author: Todd VanderArk| Date: Wed, 11 Mar 2020 16:00:32 +0000

Set a high standard of software assurance with internal teams, partners, and suppliers to reduce your risk of a software supply chain attack.

The post Guarding against supply chain attacks—Part 3: How software becomes compromised appeared first on Microsoft Security.

Read more

Behavioral blocking and containment: Transforming optics into protection

Credit to Author: Eric Avena| Date: Mon, 09 Mar 2020 16:30:20 +0000

Behavioral blocking and containment capabilities leverage multiple Microsoft Defender ATP components and features to immediately stop attacks before they can progress. We have expanded these capabilities to get even broader visibility into malicious behavior by using a rapid protection loop engine that leverages endpoint and detection response (EDR) sensors.

The post Behavioral blocking and containment: Transforming optics into protection appeared first on Microsoft Security.

Read more

Real-life cybercrime stories from DART, the Microsoft Detection and Response Team

Credit to Author: Todd VanderArk| Date: Mon, 09 Mar 2020 16:00:23 +0000

In the new DART Case Reports, you’ll find unique stories from our team’s engagements around the globe. Read the first in the series today.

The post Real-life cybercrime stories from DART, the Microsoft Detection and Response Team appeared first on Microsoft Security.

Read more

Human-operated ransomware attacks: A preventable disaster

Credit to Author: Eric Avena| Date: Thu, 05 Mar 2020 17:00:31 +0000

In human-operated ransomware attacks, adversaries exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.

The post Human-operated ransomware attacks: A preventable disaster appeared first on Microsoft Security.

Read more