Introducing security for unmanaged devices in the Enterprise network with Microsoft Defender for IoT

Credit to Author: Christine Barrett| Date: Mon, 11 Jul 2022 16:00:00 +0000

Microsoft Defender IoT is generally available to help organizations challenged with securing unmanaged Internet of Things devices connected to the network.

The post Introducing security for unmanaged devices in the Enterprise network with Microsoft Defender for IoT appeared first on Microsoft Security Blog.

Read more

KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration

Credit to Author: Christine Barrett| Date: Thu, 07 Jul 2022 16:00:00 +0000

We are excited to share that Microsoft has been rated Outstanding in Functionality in the May 2022 KuppingerCole Market Compass for Secure Collaboration. Microsoft was also the only company to be awarded the highest possible score of Strong Positive in all five categories.

The post KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration appeared first on Microsoft Security Blog.

Read more

Hive ransomware gets upgrades in Rust

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Tue, 05 Jul 2022 16:00:00 +0000

With its latest variant carrying several major upgrades, Hive proves it’s one of the fastest evolving ransomware payload, exemplifying the continuously changing ransomware ecosystem.

The post Hive ransomware gets upgrades in Rust appeared first on Microsoft Security Blog.

Read more

Toll fraud malware: How an Android application can drain your wallet

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Thu, 30 Jun 2022 14:00:00 +0000

Toll fraud malware, a subcategory of billing fraud in which malicious applications subscribe users to premium services without their knowledge or consent, is one of the most prevalent types of Android malware – and it continues to evolve.

The post Toll fraud malware: How an Android application can drain your wallet appeared first on Microsoft Security Blog.

Read more

Using process creation properties to catch evasion techniques

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Thu, 30 Jun 2022 13:30:00 +0000

We developed a robust detection method in Microsoft Defender for Endpoint that can catch known and unknown variations of a process execution class used by attackers to evade detection. This class of stealthy execution techniques include process doppelganging, process herpadering, and process ghosting.

The post Using process creation properties to catch evasion techniques appeared first on Microsoft Security Blog.

Read more

Microsoft at RSA 2022: Envisioning the future of security

Credit to Author: Emma Jones| Date: Wed, 29 Jun 2022 16:00:00 +0000

The 2022 RSA Conference was a great success, drawing 26,000 attendees to three days of cutting-edge security sessions, tutorials, seminars, and special events at Moscone Center in San Francisco. Microsoft Security was on the ground, interacting with customers and security professionals at Microsoft’s 20-plus earned sessions, as well as showcasing new solutions like Microsoft Entra that help realize our goal of comprehensive security.

The post Microsoft at RSA 2022: Envisioning the future of security appeared first on Microsoft Security Blog.

Read more

4 breakthrough ideas for compliance and data security

Credit to Author: Christine Barrett| Date: Mon, 27 Jun 2022 16:00:00 +0000

Learn how Zero Trust and other data protection strategies can help you overcome four key challenges in compliance management and data governance.

The post 4 breakthrough ideas for compliance and data security appeared first on Microsoft Security Blog.

Read more

Detecting malicious key extractions by compromised identities for Azure Cosmos DB

Credit to Author: Christine Barrett| Date: Thu, 23 Jun 2022 16:00:00 +0000

Azure Cosmos DB is a fully managed NoSQL cloud database service for modern app development. It offers a variety of advanced built-in features, such as automatic worldwide data replication, lightning-fast response types, and a variety of APIs. In this blog post, we describe security practices for securing access to Azure Cosmos DB and show how monitoring relevant control plane operations can help in the detection of potentially compromised authorization.

The post Detecting malicious key extractions by compromised identities for Azure Cosmos DB appeared first on Microsoft Security Blog.

Read more

Microsoft Defender for Office 365 receives highest award in SE Labs Enterprise Email Security Services test

Credit to Author: Christine Barrett| Date: Wed, 22 Jun 2022 16:00:00 +0000

Microsoft received an AAA Protection Award for Microsoft Defender for Office 365, the highest possible award that vendors can achieve in this test.

The post Microsoft Defender for Office 365 receives highest award in SE Labs Enterprise Email Security Services test appeared first on Microsoft Security Blog.

Read more