Find out how a cyberattack by Storm-2077 was halted faster because the Microsoft Incident Response team is both proactive and reactive at the same time. The post Build a stronger security strategy with proactive and reactive incident response: Cyberattack Series…
Tag: Microsoft Security Blog
Code injection attacks using publicly disclosed ASP.NET machine keys
Microsoft Threat Intelligence observed limited activity by an unattributed threat actor using a publicly available, static ASP.NET machine key to inject malicious code and deliver the Godzilla post-exploitation framework. In the course of investigating, remediating, and building protections against this…
Hear from Microsoft Security experts at these top cybersecurity events in 2025
Security events offer a valuable opportunity to learn about the latest trends and solutions, evolve your skills for cyberthreats, and meet like-minded security professionals. See where you can meet Microsoft Security in 2025. The post Hear from Microsoft Security experts…
3 priorities for adopting proactive identity and access security in 2025
Adopting proactive defensive measures is the only way to get ahead of determined efforts to compromise identities and gain access to your environment. The post 3 priorities for adopting proactive identity and access security in 2025 appeared first on Microsoft…
Fast-track generative AI security with Microsoft Purview
Read how Microsoft Purview can secure and govern generative AI quickly, with minimal user impact, deployment resources, and change management. The post Fast-track generative AI security with Microsoft Purview appeared first on Microsoft Security Blog. This article has been indexed…
New Star Blizzard spear-phishing campaign targets WhatsApp accounts
In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we track as Star Blizzard sending their typical targets spear-phishing messages, this time offering the supposed opportunity to join a WhatsApp group. This is the first time we have…
Innovating in line with the European Union’s AI Act
As our Microsoft AI Tour reached Brussels, Paris, and Berlin recently, we met with European organizations that were energized by the possibilities of our latest AI technologies and engaged in deployment projects. They were also alert to the fact that…
3 takeaways from red teaming 100 generative AI products
Since 2018, Microsoft’s AI Red Team has probed generative AI products for critical safety and security vulnerabilities. Read our latest blog for three lessons we’ve learned along the way. The post 3 takeaways from red teaming 100 generative AI products…
Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions
Microsoft discovered a macOS vulnerability allowing attackers to bypass System Integrity Protection (SIP) by loading third party kernel extensions, which could lead to serious consequences, such as allowing attackers to install rootkits, create persistent malware, bypass Transparency, Consent, and Control…
Why security teams rely on Microsoft Defender Experts for XDR for managed detection and response
Microsoft Defender Experts for XDR is a mature and proven service that triages, investigates, and responds to incidents and hunts for threats on a customer’s behalf around the clock. Learn more about why organizations across major industries rely on it.…