Microsoft

MicrosoftSecurity

New capabilities to help you secure your AI transformation

Credit to Author: Vasu Jakkal| Date: Mon, 06 May 2024 16:00:00 +0000

Today, we’re thrilled to introduce new features for securing and governing in the age of AI. We are announcing new capabilities in Microsoft Defender and Microsoft Purview that will make it easier for teams to manage, protect ,and govern AI applications at work.

The post New capabilities to help you secure your AI transformation appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Microsoft named overall leader in KuppingerCole Leadership Compass for ITDR

Credit to Author: Alex Weinert and Ramya Chitrakar| Date: Wed, 01 May 2024 22:00:00 +0000

Today we are thrilled to announce that Microsoft has been recognized as an overall leader in the KuppingerCole Leadership Compass Identity Threat Detection and Response: IAM Meets the SOC. The report highlights strengths across key capabilities ranging from identity posture to remediation, while further highlighting Microsoft’s commitment to protecting all organizations.

The post Microsoft named overall leader in KuppingerCole Leadership Compass for ITDR appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps

Credit to Author: Microsoft Threat Intelligence| Date: Wed, 01 May 2024 18:00:00 +0000

Microsoft discovered a vulnerability pattern in multiple popular Android applications that could enable a malicious application to overwrite files in the vulnerable application’s internal data storage directory, which could lead to arbitrary code execution and token theft, among other impacts. We have shared our findings with Google’s Android Application Security Research team, as well as the developers of apps found vulnerable to this issue. We anticipate that the vulnerability pattern could be found in other applications. We’re sharing this research more broadly so developers and publishers can check their apps for similar issues, fix as appropriate, and prevent them from being introduced into new apps or releases.

The post “Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

​​Investigating industrial control systems using Microsoft’s ICSpector open-source framework

Credit to Author: Maayan Shaul| Date: Thu, 25 Apr 2024 16:00:00 +0000

​Microsoft released ICSpector as an open-source framework to help organizations secure their industrial control systems. Read our blog post for details on how it works and why this solution is so critical given modern cybersecurity threats.

The post ​​Investigating industrial control systems using Microsoft’s ICSpector open-source framework appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

New Microsoft Incident Response guide helps simplify cyberthreat investigations

Credit to Author: Microsoft Incident Response| Date: Tue, 23 Apr 2024 16:00:00 +0000

Discover how to fortify your organization’s cybersecurity defense with this practical guide on digital forensics from Microsoft’s Incident Response team.

The post New Microsoft Incident Response guide helps simplify cyberthreat investigations appeared first on Microsoft Security Blog.

Read More