Tag: Microsoft Security Blog

Microsoft shares threat intelligence at CYBERWARCON 2023

At the CYBERWARCON 2023 conference, Microsoft and LinkedIn analysts are presenting several sessions detailing analysis across multiple sets of threat actors and related activity, demonstrating Microsoft Threat Intelligence’s ongoing efforts to track threat actors, protect customers, and share information with…

Insights from Microsoft Security Copilot early adopters

In our preview of Microsoft Security Copilot, research data shows customers can save up to 40 percent of their security analysts’ time on foundational tasks and increase efficiency up to and above 60 percent. The post Insights from Microsoft Security…

Starting your journey to become quantum-safe

Thanks to our extensive experience in quantum engineering and expertise as a service and security provider, we can serve as a trusted partner to navigate this process across industry and government.  The post Starting your journey to become quantum-safe appeared…

Cloud storage security: What’s new in the threat matrix

We’re announcing the release of a second version of our threat matrix for storage services, a structured tool that assists in identifying and analyzing potential security threats on data stored in cloud storage services. The post Cloud storage security: What’s…

Boost identity protection with Axiad Cloud and Microsoft Entra ID

As IT environments become more complex and multilayered to combat cybersecurity attacks, authentication processes for applications, operating systems, and workplace locations are increasingly managed in silos. Axiad Cloud and Microsoft Entra ID help to strengthen security perimeters by provisioning and…

Microsoft AI Red Team building future of safer AI

We’re sharing best practices from our team so others can benefit from Microsoft’s learnings. These best practices can help security teams proactively hunt for failures in AI systems, define a defense-in-depth approach, and create a plan to evolve and grow…

How to build stronger security teams

Jayson Street of Truesec talks about security awareness training and building a foundation of cybersecurity. The post How to build stronger security teams appeared first on Microsoft Security Blog. This article has been indexed from Microsoft Security Blog Read the…

Analysis of Storm-0558 techniques for unauthorized email access

Analysis of the techniques used by the threat actor tracked as Storm-0558 for obtaining unauthorized access to email data, tools, and unique infrastructure characteristics.  The post Analysis of Storm-0558 techniques for unauthorized email access appeared first on Microsoft Security Blog.…

Storm-0978 attacks reveal financial and espionage motives

Microsoft has identified a phishing campaign conducted by the threat actor tracked as Storm-0978 targeting defense and government entities in Europe and North America. The campaign involved the abuse of CVE-2023-36884, which included a zero-day remote code execution vulnerability exploited…

11 best practices for securing data in cloud services

This blog explores the importance and best practices for securing data in the cloud. It discusses concepts such as authentication, zero trust, and encryption, among others. The post 11 best practices for securing data in cloud services appeared first on…

Patch me if you can: Cyberattack Series

The Microsoft Incident Response team takes swift action to help contain a ransomware attack and regain positive administrative control of the customer environment. The post Patch me if you can: Cyberattack Series appeared first on Microsoft Security Blog. This article…