6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security strategy
Discover the top multicloud security risks across DevOps, runtime environments, identity and access, and data in this new report from Microsoft.
Microsoft security researchers have discovered a post-compromise capability we’re calling MagicWeb, which is used by a threat actor we track as NOBELIUM to maintain persistent access to compromised environments.
Threat actors evade detection by adopting the Sliver command-and-control (C2) framework in intrusion campaigns.
Proactive data governance offers a holistic approach that conserves resources and simplifies the protection of your data assets. Microsoft Purview provides a comprehensive data governance solution designed to help manage your on-premises, multicloud, and software as a service (SaaS) data. Here are five ways it can help.
Former New York Times Senior Director of Information Security Runa Sandvik shares strategies to help protect journalists and media organizations.
This month, Microsoft has been recognized by Gartner as a Leader in the 2022 Magic Quadrant for Unified Endpoint Management Tools. This blog post outlines the “so what” for IT leaders, and why we believe this Gartner analysis deserves your focus right now.
Today, Microsoft is excited to publish our second edition of Cyber Signals, spotlighting security trends and insights gathered from Microsoft’s 43 trillion security signals and 8,500 security experts. In this edition, we pull back the curtain on the evolving cybercrime economy and the rise of Ransomware-as-a-service (RaaS).
Microsoft discovered a memory corruption vulnerability in a ChromeOS component that could have been triggered remotely, allowing attackers to perform either a denial-of-service (DoS) or, in extreme cases, remote code execution (RCE).
To provide advanced protection against increasingly complex and evasive cryptojackers, Microsoft Defender Antivirus integrates with Intel® Threat Detection Technology (TDT) that applies machine learning to low-level CPU telemetry in detecting cryptojackers, even when the malware is obfuscated and can evade security tools.
Microsoft speakers at Gartner Identity & Access Management Summit focus on permissions management, infrastructure attacks, and moving to cloud-based identity.
The Microsoft Threat Intelligence Center (MSTIC) has observed and taken actions to disrupt campaigns launched by SEABORGIUM in campaigns involve persistent phishing and credential theft campaigns leading to intrusions and data theft.