Threat actors misuse OAuth applications to automate financially driven attacks

Credit to Author: Microsoft Threat Intelligence| Date: Tue, 12 Dec 2023 18:00:00 +0000

Microsoft Threat Intelligence presents cases of threat actors misusing OAuth applications as automation tools in financially motivated attacks.

The post Threat actors misuse OAuth applications to automate financially driven attacks appeared first on Microsoft Security Blog.

Read more

New Microsoft Incident Response team guide shares best practices for security teams and leaders

Credit to Author: Microsoft Incident Response| Date: Mon, 11 Dec 2023 17:00:00 +0000

The Microsoft Incident Response team shares a downloadable, interactive, people-centric, guide to effective incident response.

The post New Microsoft Incident Response team guide shares best practices for security teams and leaders appeared first on Microsoft Security Blog.

Read more

Star Blizzard increases sophistication and evasion in ongoing attacks

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 07 Dec 2023 12:01:00 +0000

Microsoft Threat Intelligence continues to track and disrupt malicious activity attributed to a Russian state-sponsored actor we track as Star Blizzard, who has improved their detection evasion capabilities since 2022 while remaining focused on email credential theft against targets.

The post Star Blizzard increases sophistication and evasion in ongoing attacks appeared first on Microsoft Security Blog.

Read more

Microsoft Security Copilot drives new product integrations at Microsoft Ignite to empower security and IT teams

Credit to Author: Kathleen Lavallee| Date: Wed, 06 Dec 2023 17:00:00 +0000

Microsoft Security Copilot offers several use cases and embedded experiences—and early access participants are already sharing their perspectives on the solution. Find out for yourself by joining the program.

The post Microsoft Security Copilot drives new product integrations at Microsoft Ignite to empower security and IT teams appeared first on Microsoft Security Blog.

Read more

Microsoft Incident Response lessons on preventing cloud identity compromise

Credit to Author: Microsoft Incident Response| Date: Tue, 05 Dec 2023 17:00:00 +0000

In real-world customer engagements, Microsoft Incident Response (Microsoft IR) sees combinations of issues and misconfigurations that could lead to attacker access to customers’ Microsoft Entra ID tenants. Effective protection of a customer’s Entra ID tenant is less challenging than protecting an Active Directory deployment but does require governance and monitoring. Reducing risk and exposure of your most privileged accounts plays a critical role in preventing or detecting attempts at tenant-wide compromise.

The post Microsoft Incident Response lessons on preventing cloud identity compromise appeared first on Microsoft Security Blog.

Read more

Protecting credentials against social engineering: Cyberattack Series

Credit to Author: Microsoft Incident Response| Date: Mon, 04 Dec 2023 17:00:00 +0000

Our fourth installation in the Cyberattack Series examines a smishing and social engineering attack and outlines the steps organizations can take to help minimize the risk and prepare for the possibility.

The post Protecting credentials against social engineering: Cyberattack Series appeared first on Microsoft Security Blog.

Read more

Forrester names Microsoft Intune a Leader in the 2023 Forrester Wave™ for Unified Endpoint Management

Credit to Author: Michael Wallent| Date: Tue, 28 Nov 2023 17:00:00 +0000

The Forrester Wave™: Unified Endpoint Management, Q4 2023 report recognizes Intune as a leader. Find out how it helps secure systems and simplify management, reduces costs, and frees up resources for creativity and innovation.

The post Forrester names Microsoft Intune a Leader in the 2023 Forrester Wave™ for Unified Endpoint Management appeared first on Microsoft Security Blog.

Read more