Microsoft

MicrosoftSecurity

Flax Typhoon using legitimate software to quietly access Taiwanese organizations

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 24 Aug 2023 16:30:00 +0000

China-based actor Flax Typhoon is exploiting known vulnerabilities for public-facing servers, legitimate VPN software, and open-source malware to gain access to Taiwanese organizations, but not taking further action.

The post Flax Typhoon using legitimate software to quietly access Taiwanese organizations appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS 

Credit to Author: Microsoft Threat Intelligence| Date: Fri, 11 Aug 2023 00:00:00 +0000

Microsoft researchers identified multiple high-severity vulnerabilities in the CODESYS V3 SDK that could put operational technology (OT) infrastructure at risk of attacks, such as remote code execution (RCE) and denial of service (DoS).

The post Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS  appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

New Microsoft Security innovations expand multicloud visibility and enhance multiplatform protection

Credit to Author: Vasu Jakkal| Date: Wed, 09 Aug 2023 16:00:00 +0000

Gain greater visibility into your multicloud environments to better understand your security posture, minimize risk, and detect and respond to threats in real time.

The post New Microsoft Security innovations expand multicloud visibility and enhance multiplatform protection appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Microsoft Purview data security mitigations for BazaCall and other human-operated data exfiltration attacks

Credit to Author: Steve Vandenberg| Date: Tue, 08 Aug 2023 17:00:00 +0000

Microsoft Defender is our toolset for prevention and mitigation of data exfiltration and ransomware attacks. Microsoft Purview data security offers important mitigations as well and should be used as part of a defense-in-depth strategy.

The post Microsoft Purview data security mitigations for BazaCall and other human-operated data exfiltration attacks appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Boost identity protection with Axiad Cloud and Microsoft Entra ID

Credit to Author: Karen Larson| Date: Tue, 08 Aug 2023 16:00:00 +0000

As IT environments become more complex and multilayered to combat cybersecurity attacks, authentication processes for applications, operating systems, and workplace locations are increasingly managed in silos. Axiad Cloud and Microsoft Entra ID help to strengthen security perimeters by provisioning and managing phishing-resistant, passwordless credentials.

The post Boost identity protection with Axiad Cloud and Microsoft Entra ID appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Adopting guidance from the US National Cybersecurity Strategy to secure the Internet of Things

Credit to Author: David Weston| Date: Mon, 07 Aug 2023 16:00:00 +0000

Microsoft is invested in helping partners create Internet of Things solutions with strong security products that support the March 2023 United States National Cybersecurity Strategy.

The post Adopting guidance from the US National Cybersecurity Strategy to secure the Internet of Things appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Microsoft AI Red Team building future of safer AI

Credit to Author: Ram Shankar Siva Kumar| Date: Mon, 07 Aug 2023 15:00:00 +0000

We’re sharing best practices from our team so others can benefit from Microsoft’s learnings. These best practices can help security teams proactively hunt for failures in AI systems, define a defense-in-depth approach, and create a plan to evolve and grow your security posture as generative AI systems evolve.

The post Microsoft AI Red Team building future of safer AI appeared first on Microsoft Security Blog.

Read More