cybersecurity

MicrosoftSecurity

How Microsoft Purview and Priva support the partner ecosystem

Credit to Author: Christine Barrett| Date: Wed, 20 Jul 2022 16:00:00 +0000

We are excited to announce the general availability of the new Microsoft Graph APIs for Microsoft Purview eDiscovery. With the new Microsoft Purview eDiscovery APIs, partners and customers can leverage automation to streamline common, repetitive workflows that require a lot of manual effort in the product experience.

The post How Microsoft Purview and Priva support the partner ecosystem appeared first on Microsoft Security Blog.

Read More
ScadaICSSchneider

Chemical industry OT cybersecurity requires partnership with control system experts

Credit to Author: Irfan Yunus| Date: Tue, 19 Jul 2022 12:00:24 +0000

Worldwide, chemical companies have emerged as high-value targets for cybercriminals. Protecting proprietary formulas, customer databases, and safety mechanisms from cyberattacks is a primary focus for the chemical industry. In the… Read more »

The post Chemical industry OT cybersecurity requires partnership with control system experts appeared first on Schneider Electric Blog.

Read More
MicrosoftSecurity

How Microsoft Security partners are helping customers do more with less

Credit to Author: Christine Barrett| Date: Tue, 19 Jul 2022 15:00:00 +0000

The Microsoft Security partner opportunity grew 21 percent year-over-year, particularly in Microsoft 365 security, cloud security, compliance, and identity. Microsoft Security partners are expanding their existing offerings and creating new offerings in all these areas, packaging their unique experience, expertise, and IP for effective and efficient service delivery.

The post How Microsoft Security partners are helping customers do more with less appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

North Korean threat actor targets small and midsize businesses with H0lyGh0st ransomware

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Thu, 14 Jul 2022 16:00:00 +0000

A group of actors originating from North Korea that MSTIC tracks as DEV-0530 has been developing and using ransomware in attacks since June 2021. This group, which calls itself H0lyGh0st, utilizes a ransomware payload with the same name.

The post North Korean threat actor targets small and midsize businesses with H0lyGh0st ransomware appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Microsoft recognized as a Leader in UEM Software 2022 IDC MarketScape reports

Credit to Author: Emma Jones| Date: Wed, 13 Jul 2022 17:00:00 +0000

Competition for talent has increased pressure to lead in the digital space, and business decisions now weigh user experience for employees heavily among costs and benefits. Workers insist on experiences that mirror their personal experience, often on their own device.

The post Microsoft recognized as a Leader in UEM Software 2022 IDC MarketScape reports appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Uncovering a macOS App Sandbox escape vulnerability: A deep dive into CVE-2022-26706

Credit to Author: Paul Oliveria| Date: Wed, 13 Jul 2022 16:00:00 +0000

Microsoft uncovered a vulnerability in macOS that could allow specially crafted codes to escape the App Sandbox and run unrestricted on the system. We shared these findings with Apple, and fix for this vulnerability, now identified as CVE-2022-26706, was included in the security updates on May 16, 2022.

The post Uncovering a macOS App Sandbox escape vulnerability: A deep dive into CVE-2022-26706 appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud

Credit to Author: Paul Oliveria| Date: Tue, 12 Jul 2022 16:00:00 +0000

A large-scale phishing campaign that attempted to target over 10,000 organizations since September 2021 used adversary-in-the-middle (AiTM) phishing sites to steal passwords, hijack a user’s sign-in session, and skip the authentication process, even if the user had enabled multifactor authentication (MFA).

The post From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud appeared first on Microsoft Security Blog.

Read More