The Department of Defense (DoD) released its formal Zero Trust strategy today, marking a major milestone in its goal of[…]
Leggi di più
Notebooks are gaining popularity in InfoSec. Used interactively for investigations and hunting or as scheduled processing jobs, notebooks offer plenty[…]
Leggi di più
Vulnerabilities in network components, architecture files, and developer tools have become increasingly popular attack vectors to gain access into secure[…]
Leggi di più
Recent activity from the threat actor that Microsoft tracks as DEV-0569, known to distribute various payloads, has led to the[…]
Leggi di più
On August 4, 2022, Microsoft publicly shared a framework that it has been using to secure its own development practices[…]
Leggi di più
As organizations increase their coverage of multifactor authentication (MFA), threat actors have begun to move to more sophisticated techniques to[…]
Leggi di più
The holiday season is an exciting time for many people as they get to relax, connect with friends and family,[…]
Leggi di più
The General Data Protection Regulation (GDPR) came into effect in 2018 and set a new standard for the level of[…]
Leggi di più
At CyberWarCon 2022, Microsoft and LinkedIn analysts presented several sessions detailing analysis across multiple sets of actors and related activity.[…]
Leggi di più
Microsoft Defender Experts for Hunting, our newest managed threat hunting service, delivered industry-leading results during the inaugural MITRE Engenuity ATT&CK®[…]
Leggi di più
We are honored to announce that Microsoft has been named a Leader in the 2022 Gartner® Magic QuadrantTM for Access[…]
Leggi di più
Command-and-control (C2) servers are an essential part of ransomware, commodity, and nation-state attacks. They are used to control infected devices[…]
Leggi di più