Microsoft

MicrosoftSecurity

Join us at InfoSec Jupyterthon 2024

Credit to Author: Microsoft Threat Intelligence| Date: Mon, 29 Jan 2024 18:00:00 +0000

Jupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center (SOC) tools. Notebooks can be used interactively for threat detection and response, or as automated tasks in a larger pipeline. Their flexibility and ability to combine code, data analysis, and visualization in a single, […]

The post Join us at InfoSec Jupyterthon 2024 appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Best practices in moving to cloud native endpoint management

Credit to Author: Jason Roszak| Date: Mon, 29 Jan 2024 17:00:00 +0000

This blog is the second of three that details our recommendation to adopt cloud native device management. Understand the lessons from various Intune customers in their journeys and how they achieved greater security, cost savings, and readiness for the future through their cloud transformations.

The post Best practices in moving to cloud native endpoint management appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Midnight Blizzard: Guidance for responders on nation-state attack

Credit to Author: Microsoft Threat Intelligence| Date: Fri, 26 Jan 2024 00:00:00 +0000

The Microsoft security team detected a nation-state attack on our corporate systems on January 12, 2024, and immediately activated our response process to investigate, disrupt malicious activity, mitigate the attack, and deny the threat actor further access. The Microsoft Threat Intelligence investigation identified the threat actor as Midnight Blizzard, the Russian state-sponsored actor also known as NOBELIUM.

The post Midnight Blizzard: Guidance for responders on nation-state attack appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

How Datawiza uses Microsoft Entra ID to help universities simplify access

Credit to Author: Rocky Gunderson| Date: Wed, 24 Jan 2024 17:00:00 +0000

Datawiza helps Claremont Graduate University enable Microsoft Entra ID multifactor authentication and single sign-on for Oracle PeopleSoft, streamling and improving the student experience.

The post How Datawiza uses Microsoft Entra ID to help universities simplify access appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Microsoft at Legalweek: Secure data and gain efficiencies with Microsoft Purview eDiscovery enhanced by generative AI

Credit to Author: Caitlin Fitzgerald| Date: Thu, 18 Jan 2024 17:00:00 +0000

Microsoft solutions can ease some of the top challenges of legal professionals. Read on for two advantages of the combination of Microsoft Purview eDiscovery and generative AI, and explore opportunities to connect with us at Legalweek.

The post Microsoft at Legalweek: Secure data and gain efficiencies with Microsoft Purview eDiscovery enhanced by generative AI appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

New Microsoft Incident Response guides help security teams analyze suspicious activity

Credit to Author: Microsoft Incident Response| Date: Wed, 17 Jan 2024 18:00:00 +0000

Access the first two cloud investigation guides from Microsoft Incident Response to improve triage and analysis of data in Microsoft 365 and Microsoft Entra ID.

The post New Microsoft Incident Response guides help security teams analyze suspicious activity appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs

Credit to Author: Microsoft Threat Intelligence| Date: Wed, 17 Jan 2024 17:00:00 +0000

Since November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHORUS) targeting high-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza, Israel, the United Kingdom, and the United States. In this campaign, the threat actor used bespoke phishing lures in an attempt to socially engineer targets into downloading malicious files.

The post New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs appeared first on Microsoft Security Blog.

Read More