Ultimi Aggiornamenti di Cybersecurity

DEV-0139 launches targeted attacks against the cryptocurrency industry

Over the past several years, the cryptocurrency market has considerably expanded, gaining the interest of investors and threat actors. Cryptocurrency[…]

Leggi di più
Implementing Zero Trust access to business data on BYOD with Trustd MTD and Microsoft Entra

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  As more employees work[…]

Leggi di più
Forrester TEI highlights 3 benefits of Power Platform premium capabilities

Microsoft Power Platform recently commissioned a Forrester Total Economic Impact study to help customers better understand the value of Microsoft[…]

Leggi di più
Microsoft supports the DoD’s Zero Trust strategy

The Department of Defense (DoD) released its formal Zero Trust strategy today, marking a major milestone in its goal of[…]

Leggi di più
Join us at InfoSec Jupyterthon 2022

Notebooks are gaining popularity in InfoSec. Used interactively for investigations and hunting or as scheduled processing jobs, notebooks offer plenty[…]

Leggi di più
Vulnerable SDK components lead to supply chain risks in IoT and OT environments

Vulnerabilities in network components, architecture files, and developer tools have become increasingly popular attack vectors to gain access into secure[…]

Leggi di più
DEV-0569 finds new ways to deliver Royal ransomware, various payloads

Recent activity from the threat actor that Microsoft tracks as DEV-0569, known to distribute various payloads, has led to the[…]

Leggi di più
Microsoft contributes S2C2F to OpenSSF to improve supply chain security

On August 4, 2022, Microsoft publicly shared a framework that it has been using to secure its own development practices[…]

Leggi di più
Token tactics: How to prevent, detect, and respond to cloud token theft

As organizations increase their coverage of multifactor authentication (MFA), threat actors have begun to move to more sophisticated techniques to[…]

Leggi di più
2022 holiday DDoS protection guide

The holiday season is an exciting time for many people as they get to relax, connect with friends and family,[…]

Leggi di più
Simplify privacy protection with Microsoft Priva Subject Rights Requests

The General Data Protection Regulation (GDPR) came into effect in 2018 and set a new standard for the level of[…]

Leggi di più
Microsoft threat intelligence presented at CyberWarCon 2022 

At CyberWarCon 2022, Microsoft and LinkedIn analysts presented several sessions detailing analysis across multiple sets of actors and related activity.[…]

Leggi di più