Microsoft

MicrosoftSecurity

Build a stronger security strategy with proactive and reactive incident response: Cyberattack Series

Credit to Author: Microsoft Incident Response| Date: Mon, 10 Feb 2025 17:00:00 +0000

Find out how a cyberattack by Storm-2077 was halted faster because the Microsoft Incident Response team is both proactive and reactive at the same time.

The post Build a stronger security strategy with proactive and reactive incident response: Cyberattack Series appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Code injection attacks using publicly disclosed ASP.NET machine keys

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 06 Feb 2025 18:00:00 +0000

Microsoft Threat Intelligence observed limited activity by an unattributed threat actor using a publicly available, static ASP.NET machine key to inject malicious code and deliver the Godzilla post-exploitation framework. In the course of investigating, remediating, and building protections against this activity, we observed an insecure practice whereby developers have incorporated various publicly disclosed ASP.NET machine keys from publicly accessible resources, such as code documentation and repositories, which threat actors have used to launch ViewState code injection attacks and perform malicious actions on target servers.

The post Code injection attacks using publicly disclosed ASP.NET machine keys appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Hear from Microsoft Security experts at these top cybersecurity events in 2025

Credit to Author: Benjamin Lim| Date: Mon, 03 Feb 2025 17:00:00 +0000

Security events offer a valuable opportunity to learn about the latest trends and solutions, evolve your skills for cyberthreats, and meet like-minded security professionals. See where you can meet Microsoft Security in 2025.

The post Hear from Microsoft Security experts at these top cybersecurity events in 2025 appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

New Star Blizzard spear-phishing campaign targets WhatsApp accounts

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 16 Jan 2025 17:00:00 +0000

In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we track as Star Blizzard sending their typical targets spear-phishing messages, this time offering the supposed opportunity to join a WhatsApp group. This is the first time we have identified a shift in Star Blizzard’s longstanding tactics, techniques, and procedures (TTPs) to leverage a […]

The post New Star Blizzard spear-phishing campaign targets WhatsApp accounts appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Innovating in line with the European Union’s AI Act 

Credit to Author: Natasha Crampton| Date: Wed, 15 Jan 2025 14:10:00 +0000

As our Microsoft AI Tour reached Brussels, Paris, and Berlin recently, we met with European organizations that were energized by the possibilities of our latest AI technologies and engaged in deployment projects. They were also alert to the fact that 2025 is the year that key obligations under the European Union’s AI Act come into effect, opening a new chapter in digital regulation as the world’s first, comprehensive AI law becomes a reality.

The post Innovating in line with the European Union’s AI Act  appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions

Credit to Author: Microsoft Threat Intelligence| Date: Mon, 13 Jan 2025 17:00:00 +0000

Microsoft discovered a macOS vulnerability allowing attackers to bypass System Integrity Protection (SIP) by loading third party kernel extensions, which could lead to serious consequences, such as allowing attackers to install rootkits, create persistent malware, bypass Transparency, Consent, and Control (TCC), and expand the attack surface to perform other unauthorized operations.

The post Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions appeared first on Microsoft Security Blog.

Read More