Category: Microsoft Security Blog

Join us at InfoSec Jupyterthon 2024

Jupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center (SOC) tools. Notebooks can be used interactively for threat detection and response, or as automated tasks in a larger…

5 ways to secure identity and access for 2024

To confidently secure identity and access at your organization, here are five areas Microsoft recommends prioritizing in the new year.​ The post 5 ways to secure identity and access for 2024 appeared first on Microsoft Security Blog. This article has…

Financially motivated threat actors misusing App Installer

Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, including financially motivated actors like Storm-0569, Storm-1113, Sangria Tempest, and Storm-1674, utilizing the ms-appinstaller URI scheme (App Installer) to distribute malware. The post Financially motivated threat actors misusing App Installer…

Microsoft shares threat intelligence at CYBERWARCON 2023

At the CYBERWARCON 2023 conference, Microsoft and LinkedIn analysts are presenting several sessions detailing analysis across multiple sets of threat actors and related activity, demonstrating Microsoft Threat Intelligence’s ongoing efforts to track threat actors, protect customers, and share information with…

Insights from Microsoft Security Copilot early adopters

In our preview of Microsoft Security Copilot, research data shows customers can save up to 40 percent of their security analysts’ time on foundational tasks and increase efficiency up to and above 60 percent. The post Insights from Microsoft Security…

Starting your journey to become quantum-safe

Thanks to our extensive experience in quantum engineering and expertise as a service and security provider, we can serve as a trusted partner to navigate this process across industry and government.  The post Starting your journey to become quantum-safe appeared…