MSTICPy January 2022 hackathon highlights

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Fri, 25 Feb 2022 17:00:00 +0000

In January 2022, MSTIC ran its inaugural hack month for the open-source Jupyter and Python Security Tools library, MSTICPy. This blog highlights some of the contributions.

The post MSTICPy January 2022 hackathon highlights appeared first on Microsoft Security Blog.

Read more

Microsoft Security delivers new multicloud capabilities

Credit to Author: Pooja Parab| Date: Wed, 23 Feb 2022 14:00:00 +0000

In times of great change, challenges and opportunities can be found in many directions. Today, we’re announcing new advances to help customers strengthen visibility and control across multiple cloud providers, workloads, devices, and digital identities—all from a centralized management view.

The post Microsoft Security delivers new multicloud capabilities appeared first on Microsoft Security Blog.

Read more

‘Ice phishing’ on the blockchain

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 16 Feb 2022 17:00:00 +0000

Our recent analysis of a phishing attack connected to the blockchain reaffirms the durability of threats like social engineering, as well as the need for security fundamentals to be built into related future systems and frameworks.

The post ‘Ice phishing’ on the blockchain appeared first on Microsoft Security Blog.

Read more

What’s Next in Security from Microsoft

Credit to Author: Pooja Parab| Date: Thu, 10 Feb 2022 17:00:00 +0000

On February 24, 2022, at the What’s Next in Security from Microsoft digital event, you’ll learn how a comprehensive approach to security will give you the confidence to take appropriate business risks that move your company forward. At this event, Vasu Jakkal, Microsoft Corporate Vice President of Security, Compliance, and Identity, and other security experts will share exciting new innovations that help reduce the risk from the latest threats.

The post What’s Next in Security from Microsoft appeared first on Microsoft Security Blog.

Read more

ACTINIUM targets Ukrainian organizations

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Fri, 04 Feb 2022 18:00:00 +0000

The Microsoft Threat Intelligence Center (MSTIC) is sharing information on a threat group named ACTINIUM, which has been operational for almost a decade and has consistently pursued access to organizations in Ukraine or entities related to Ukrainian affairs. MSTIC previously tracked ACTINIUM activity as DEV-0157, and this group is also referred to publicly as Gamaredon.…

The post ACTINIUM targets Ukrainian organizations appeared first on Microsoft Security Blog.

Read more

Cyber Signals: Defending against cyber threats with the latest research, insights, and trends

Credit to Author: Emma Jones| Date: Thu, 03 Feb 2022 14:00:00 +0000

We’re excited to introduce Cyber Signals, a cyber threat intelligence brief informed by the latest Microsoft threat data and research. This content, which will be released quarterly, offers an expert perspective into the current threat landscape, discussing trending tactics, techniques, and strategies used by the world’s most prolific threat actors.

The post Cyber Signals: Defending against cyber threats with the latest research, insights, and trends appeared first on Microsoft Security Blog.

Read more

The evolution of a Mac trojan: UpdateAgent’s progression

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 02 Feb 2022 17:00:00 +0000

Our discovery and analysis of a sophisticated Mac trojan in October exposed a year-long evolution of a malware family—and depicts the rising complexity of threats across platforms.

The post The evolution of a Mac trojan: UpdateAgent’s progression appeared first on Microsoft Security Blog.

Read more

Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 26 Jan 2022 17:00:00 +0000

We uncovered a large-scale, multi-phase campaign that adds a novel technique to traditional phishing tactics by joining an attacker-operated device to an organization’s network to further propagate the campaign.

The post Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA appeared first on Microsoft Security Blog.

Read more