6 Marzo 2025
Malvertising campaign leads to info stealers hosted on GitHub

In early December 2024, Microsoft Threat Intelligence detected a large-scale malvertising campaign that impacted nearly one million devices globally in an opportunistic attack to steal information. The attack originated from illegal streaming websites embedded with malvertising redirectors, leading to an intermediary website where the user was then redirected[…]

Read More
5 Marzo 2025
[Launched] Generally Available: Custom Secure Boot UEFI Keys for Azure Trusted Launch VM

Trusted Launch VM now supports customizing secure boot UEFI keys. One or more of the secure boot keys and/or databases (PK, KEK, DB, or DBX) can be fully replaced or updated. This allows additional flexibility to further secure workloads using Trusted Lau Source: Microsoft Azure – aggiornamenti

Read More
5 Marzo 2025
[Launched] Generally Available: Custom Secure Boot UEFI Keys for Azure Trusted Launch VM

Trusted Launch VM now supports customizing secure boot UEFI keys. One or more of the secure boot keys and/or databases (PK, KEK, DB, or DBX) can be fully replaced or updated. This allows additional flexibility to further secure workloads using Trusted Lau Source: Microsoft Azure – aggiornamenti

Read More
5 Marzo 2025
Silk Typhoon targeting IT supply chain

Executive summary:Microsoft Threat Intelligence identified a shift in tactics by Silk Typhoon, a Chinese espionage group, now targeting common IT solutions like remote management tools and cloud applications to gain initial access. While they haven’t been observed directly targeting Microsoft cloud services, they do exploit unpatched applications that[…]

Read More
5 Marzo 2025
Silk Typhoon targeting IT supply chain

Executive summary:Microsoft Threat Intelligence identified a shift in tactics by Silk Typhoon, a Chinese espionage group, now targeting common IT solutions like remote management tools and cloud applications to gain initial access. While they haven’t been observed directly targeting Microsoft cloud services, they do exploit unpatched applications that[…]

Read More