Notebooks are gaining popularity in InfoSec. Used interactively for investigations and hunting or as scheduled processing jobs, notebooks offer plenty[…]
Leggi di piùVulnerabilities in network components, architecture files, and developer tools have become increasingly popular attack vectors to gain access into secure[…]
Leggi di piùRecent activity from the threat actor that Microsoft tracks as DEV-0569, known to distribute various payloads, has led to the[…]
Leggi di piùOn August 4, 2022, Microsoft publicly shared a framework that it has been using to secure its own development practices[…]
Leggi di piùAs organizations increase their coverage of multifactor authentication (MFA), threat actors have begun to move to more sophisticated techniques to[…]
Leggi di piùThe holiday season is an exciting time for many people as they get to relax, connect with friends and family,[…]
Leggi di piùThe General Data Protection Regulation (GDPR) came into effect in 2018 and set a new standard for the level of[…]
Leggi di piùAt CyberWarCon 2022, Microsoft and LinkedIn analysts presented several sessions detailing analysis across multiple sets of actors and related activity.[…]
Leggi di piùMicrosoft Defender Experts for Hunting, our newest managed threat hunting service, delivered industry-leading results during the inaugural MITRE Engenuity ATT&CK®[…]
Leggi di piùWe are honored to announce that Microsoft has been named a Leader in the 2022 Gartner® Magic QuadrantTM for Access[…]
Leggi di piùCommand-and-control (C2) servers are an essential part of ransomware, commodity, and nation-state attacks. They are used to control infected devices[…]
Leggi di piùThe security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest[…]
Leggi di più