3 strategies for building an information protection program

Credit to Author: Todd VanderArk| Date: Tue, 25 Jun 2019 16:20:29 +0000

Five years ago, we started on a journey to update and simplify information protection at Microsoft. We’ve learned a lot about data protection and tools and today we’re sharing some of our best practices.

The post 3 strategies for building an information protection program appeared first on Microsoft Security.

Read more

Inside out: Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection

Credit to Author: Eric Avena| Date: Mon, 24 Jun 2019 15:00:55 +0000

While Windows Defender Antivirus makes catching 5 billion threats on devices every month look easy, multiple advanced detection and prevention technologies work under the hood to make this happen. Multiple next-generation protection engines to detect and stop a wide range of threats and attacker techniques at multiple points, providing industry-best detection and blocking capabilities.

The post Inside out: Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection appeared first on Microsoft Security.

Read more

New browser extensions for integrating Microsoft’s hardware-based isolation

Credit to Author: Eric Avena| Date: Thu, 23 May 2019 15:50:07 +0000

The hardware-based isolation technology on Windows 10 that allows Microsoft Edge to isolate browser-based attacks is now available as a browser extension for Google Chrome and Mozilla Firefox. We introduced the container technology in 2017. Since then, we have been evolving the technology and engaging with customers to understand how hardware-based isolation can best help…

The post New browser extensions for integrating Microsoft’s hardware-based isolation appeared first on Microsoft Security.

Read more

Detecting credential theft through memory access modelling with Microsoft Defender ATP

Credit to Author: Eric Avena| Date: Thu, 09 May 2019 17:29:45 +0000

Microsoft Defender ATP instruments memory-related function calls such as VirtualAlloc and VirtualProtect to catch in-memory attack techniques like reflective DLL loading. The same signals can also be used to generically detect malicious credential dumping activities performed by a wide range of different individual tools.

The post Detecting credential theft through memory access modelling with Microsoft Defender ATP appeared first on Microsoft Security.

Read more

Introducing the security configuration framework: A prioritized guide to hardening Windows 10

Credit to Author: Eric Avena| Date: Thu, 11 Apr 2019 15:00:41 +0000

The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. We are defining discrete prescriptive Windows 10 security configurations (levels 5 through 1) to meet many of the common device scenarios we see today in the enterprise.

The post Introducing the security configuration framework: A prioritized guide to hardening Windows 10 appeared first on Microsoft Security.

Read more

Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability

Credit to Author: Eric Avena| Date: Wed, 10 Apr 2019 15:00:58 +0000

A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.

The post Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability appeared first on Microsoft Security.

Read more

Steer clear of tax scams

Credit to Author: Eric Avena| Date: Fri, 05 Apr 2019 16:00:13 +0000

In the month of February, we saw an average of 300,000 phishing attempts across Microsoft’s browsing platforms daily. Our security experts expect these attempted scams to become increasingly more prevalent through the April 15 tax day.

The post Steer clear of tax scams appeared first on Microsoft Security.

Read more