The art and science behind Microsoft threat hunting: Part 1

Credit to Author: Christine Barrett| Date: Thu, 08 Sep 2022 16:00:00 +0000

At Microsoft, we define threat hunting as the practice of actively looking for cyberthreats that have covertly (or not so covertly) penetrated an environment. This involves looking beyond the known alerts or malicious threats to discover new potential threats and vulnerabilities.

The post The art and science behind Microsoft threat hunting: Part 1 appeared first on Microsoft Security Blog.

Read more

Microsoft investigates Iranian attacks against the Albanian government

Credit to Author: Paul Oliveria| Date: Thu, 08 Sep 2022 15:00:00 +0000

Shortly after the destructive cyberattacks on the Albanian government in mid-July, the Microsoft Detection and Response Team (DART) was engaged to lead an investigation into the attacks.

The post Microsoft investigates Iranian attacks against the Albanian government appeared first on Microsoft Security Blog.

Read more

How Malicious Actors Abuse Native Linux Tools in Attacks

Credit to Author: Nitesh Surana| Date: Thu, 08 Sep 2022 00:00:00 +0000

Through our honeypots and telemetry, we were able to observe instances in which malicious actors abused native Linux tools to launch attacks on Linux environments. In this blog entry, we discuss how these utilities were used and provide recommendations on how to minimize their impact.

Read more

Security SOS Week 2022 registration is now open!

Credit to Author: Editor| Date: Thu, 08 Sep 2022 09:00:12 +0000

Back by popular demand, five top security experts are stepping up to the microphone to share their expertise on cybersecurity prevention, detection, incident response, and security operations. Registration is now open for this year’s Security SOS Week, which takes place September 26-29, 2022. Get up to speed on cybersecurity prevention, detection, incident response, and security […]

Read more

CIEM vs CWPP vs CSPM

Credit to Author: Michael Langford| Date: Thu, 08 Sep 2022 00:00:00 +0000

This article will explore three solutions, CIEM, CWPP, and CSPM, detail a sample case for each, and help you to determine when and how to use them—whether individually or in conjunction with one another.

Read more

Biden Cybersecurity Executive Order: Ex-USSS Reflects

Credit to Author: Ed Cabrera| Date: Thu, 08 Sep 2022 00:00:00 +0000

Ed Cabrera, former CISO of the US Secret Service and current Chief Cybersecurity Officer for Trend Micro, reflects on the effectiveness of Biden’s executive order and what organizations of all sizes can learn from it.

Read more