MSTICPy January 2022 hackathon highlights

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Fri, 25 Feb 2022 17:00:00 +0000

In January 2022, MSTIC ran its inaugural hack month for the open-source Jupyter and Python Security Tools library, MSTICPy. This blog highlights some of the contributions.

The post MSTICPy January 2022 hackathon highlights appeared first on Microsoft Security Blog.

Read more

Microsoft Security delivers new multicloud capabilities

Credit to Author: Pooja Parab| Date: Wed, 23 Feb 2022 14:00:00 +0000

In times of great change, challenges and opportunities can be found in many directions. Today, we’re announcing new advances to help customers strengthen visibility and control across multiple cloud providers, workloads, devices, and digital identities—all from a centralized management view.

The post Microsoft Security delivers new multicloud capabilities appeared first on Microsoft Security Blog.

Read more

The federal Zero Trust strategy and Microsoft’s deployment guidance for all

Credit to Author: Emma Jones| Date: Tue, 22 Feb 2022 17:00:00 +0000

On January 26, 2022, the White House announced it’s Federal Zero Trust strategy. The security announcement is a key milestone for all those that understand the importance of a Zero Trust model and are working hard to achieve it.

The post The federal Zero Trust strategy and Microsoft’s deployment guidance for all appeared first on Microsoft Security Blog.

Read more

US Government sets forth Zero Trust architecture strategy and requirements

Credit to Author: Emma Jones| Date: Thu, 17 Feb 2022 18:00:00 +0000

To help protect the United States from increasingly sophisticated cyber threats, the White House issued Executive Order 14028 on Improving the Nation’s Cybersecurity, requiring US Federal Government organizations to take action to strengthen national cybersecurity.

The post US Government sets forth Zero Trust architecture strategy and requirements appeared first on Microsoft Security Blog.

Read more

‘Ice phishing’ on the blockchain

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 16 Feb 2022 17:00:00 +0000

Our recent analysis of a phishing attack connected to the blockchain reaffirms the durability of threats like social engineering, as well as the need for security fundamentals to be built into related future systems and frameworks.

The post ‘Ice phishing’ on the blockchain appeared first on Microsoft Security Blog.

Read more

What’s Next in Security from Microsoft

Credit to Author: Pooja Parab| Date: Thu, 10 Feb 2022 17:00:00 +0000

On February 24, 2022, at the What’s Next in Security from Microsoft digital event, you’ll learn how a comprehensive approach to security will give you the confidence to take appropriate business risks that move your company forward. At this event, Vasu Jakkal, Microsoft Corporate Vice President of Security, Compliance, and Identity, and other security experts will share exciting new innovations that help reduce the risk from the latest threats.

The post What’s Next in Security from Microsoft appeared first on Microsoft Security Blog.

Read more

Cybersecurity threats are always changing—staying on top of them is vital, getting ahead of them is paramount

Credit to Author: Pooja Parab| Date: Wed, 09 Feb 2022 20:00:00 +0000

Monitoring and gaining insights from over 24 trillion signals daily, Microsoft Security and industry leaders provide expert guidance and insights on cyber threats and trends.

The post Cybersecurity threats are always changing—staying on top of them is vital, getting ahead of them is paramount appeared first on Microsoft Security Blog.

Read more

Detect active network reconnaissance with Microsoft Defender for Endpoint

Credit to Author: Pooja Parab| Date: Mon, 07 Feb 2022 17:00:00 +0000

Active network reconnaissance is a critical component of the cybersecurity kill chain allowing for network topography and endpoint services to be mapped and used in targeted campaigns. Microsoft Defender for Endpoint can help to detect and disrupt these attacks at the earliest stages, providing our defenders with a powerful tool to gain visibility, take appropriate action and mitigate the risk of endpoint exploitation.

The post Detect active network reconnaissance with Microsoft Defender for Endpoint appeared first on Microsoft Security Blog.

Read more

ACTINIUM targets Ukrainian organizations

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Fri, 04 Feb 2022 18:00:00 +0000

The Microsoft Threat Intelligence Center (MSTIC) is sharing information on a threat group named ACTINIUM, which has been operational for almost a decade and has consistently pursued access to organizations in Ukraine or entities related to Ukrainian affairs. MSTIC previously tracked ACTINIUM activity as DEV-0157, and this group is also referred to publicly as Gamaredon.…

The post ACTINIUM targets Ukrainian organizations appeared first on Microsoft Security Blog.

Read more