cybersecurity

MicrosoftSecurity

DEV-0139 launches targeted attacks against the cryptocurrency industry

Credit to Author: Katie McCafferty| Date: Tue, 06 Dec 2022 17:00:00 +0000

Microsoft security researchers investigate an attack where the threat actor, tracked DEV-0139, used chat groups to target specific cryptocurrency investment companies and run a backdoor within their network.

The post DEV-0139 launches targeted attacks against the cryptocurrency industry appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Implementing Zero Trust access to business data on BYOD with Trustd MTD and Microsoft Entra

Credit to Author: Christine Barrett| Date: Wed, 30 Nov 2022 17:00:00 +0000

Protect business data—and employee privacy—with conditional access on employees’ personal devices with Trustd MTD and Microsoft Entra.

The post Implementing Zero Trust access to business data on BYOD with Trustd MTD and Microsoft Entra appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Vulnerable SDK components lead to supply chain risks in IoT and OT environments

Credit to Author: Katie McCafferty| Date: Tue, 22 Nov 2022 17:00:00 +0000

As vulnerabilities in network components, architecture files, and developer tools have become an increasingly popular attack vector to leverage access into secure networks and devices, Microsoft identified such a vulnerable component and found evidence of a supply chain risk that might affect millions of organizations and devices.

The post Vulnerable SDK components lead to supply chain risks in IoT and OT environments appeared first on Microsoft Security Blog.

Read More
ScadaICSSchneider

Why OT shouldn’t be an afterthought in your data center cybersecurity strategy

Credit to Author: Steven Brown| Date: Fri, 18 Nov 2022 15:00:00 +0000

The convergence of OT (Operational Technology) and IT (Information Technology) in industrial environments has opened the operational side to cyber dangers that traditionally targeted IT. Yet, despite all the warning… Read more »

The post Why OT shouldn’t be an afterthought in your data center cybersecurity strategy appeared first on Schneider Electric Blog.

Read More
MicrosoftSecurity

DEV-0569 finds new ways to deliver Royal ransomware, various payloads

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Thu, 17 Nov 2022 17:00:00 +0000

DEV-0569’s recent activity shows their reliance on malvertising and phishing in delivering malicious payloads. The group’s changes and updates in delivery and payload led to distribution of info stealers and Royal ransomware.

The post DEV-0569 finds new ways to deliver Royal ransomware, various payloads appeared first on Microsoft Security Blog.

Read More