Microsoft protects against human-operated ransomware across the full attack chain in the 2022 MITRE Engenuity ATT&CK® Evaluations

For the fourth year in a row, the independent MITRE Engenuity ATT&CK® Evaluations demonstrated that threats are no match for Microsoft’s multi-platform extended detection and response (XDR) defense capabilities.
The post Microsoft protects against human-operated ransomware across the full attack chain in the 2022 MITRE Engenuity ATT&CK® Evaluations appeared first on Microsoft Security Blog. READ MORE HERE…

Read more

DEV-0537 criminal actor targeting organizations for data exfiltration and destruction

The activity we have observed has been attributed to a threat group that Microsoft tracks as DEV-0537, also known as LAPSUS$. DEV-0537 is known for using a pure extortion and destruction model without deploying ransomware payloads.
The post DEV-0537 criminal actor targeting organizations for data exfiltration and destruction appeared first on Microsoft Security Blog. READ MORE HERE…

Read more

Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure

The Microsoft Defender for IoT research team has recently discovered the exact method through which MikroTik devices are used in Trickbot’s C2 infrastructure. In this blog, we share the analysis of this method and provide insights on how attackers gain access and how they use compromised IoT devices in Trickbot attacks.
The post Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure appeared first on Microsoft Security Blog. READ MORE HERE…

Read more

Microsoft Security delivers new multicloud capabilities

In times of great change, challenges and opportunities can be found in many directions. Today, we’re announcing new advances to help customers strengthen visibility and control across multiple cloud providers, workloads, devices, and digital identities—all from a centralized management view.
The post Microsoft Security delivers new multicloud capabilities appeared first on Microsoft Security Blog. READ MORE HERE…

Read more

‘Ice phishing’ on the blockchain

Our recent analysis of a phishing attack connected to the blockchain reaffirms the durability of threats like social engineering, as well as the need for security fundamentals to be built into related future systems and frameworks.
The post ‘Ice phishing’ on the blockchain appeared first on Microsoft Security Blog. READ MORE HERE…

Read more

What’s Next in Security from Microsoft

On February 24, 2022, at the What’s Next in Security from Microsoft digital event, you’ll learn how a comprehensive approach to security will give you the confidence to take appropriate business risks that move your company forward. At this event, Vasu Jakkal, Microsoft Corporate Vice President of Security, Compliance, and Identity, and other security experts will share exciting new innovations that help reduce the risk from the latest threats.
The post What’s Next in Security from Microsoft appeared first on Microsoft Security Blog. READ MORE HERE…

Read more

ACTINIUM targets Ukrainian organizations

The Microsoft Threat Intelligence Center (MSTIC) is sharing information on a threat group named ACTINIUM, which has been operational for almost a decade and has consistently pursued access to organizations in Ukraine or entities related to Ukrainian affairs.
The post ACTINIUM targets Ukrainian organizations appeared first on Microsoft Security Blog. READ MORE HERE…

Read more

Cyber Signals: Defending against cyber threats with the latest research, insights, and trends

We’re excited to introduce Cyber Signals, a cyber threat intelligence brief informed by the latest Microsoft threat data and research. This content, which will be released quarterly, offers an expert perspective into the current threat landscape, discussing trending tactics, techniques, and strategies used by the world’s most prolific threat actors.
The post Cyber Signals: Defending against cyber threats with the latest research, insights, and trends appeared first on Microsoft Security Blog. READ MORE HERE…

Read more

The evolution of a Mac trojan: UpdateAgent’s progression

Our discovery and analysis of a sophisticated Mac trojan in October exposed a year-long evolution of a malware family—and depicts the rising complexity of threats across platforms.
The post The evolution of a Mac trojan: UpdateAgent’s progression appeared first on Microsoft Security Blog. READ MORE HERE…

Read more