Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'Microsoft' | www.SecurityPhresh.com
Security News from 'Microsoft'
Showing 'Security News from 'Microsoft'' from 41 to 50
Invisible Resource Thieves: The Increasing Threat Of Cryptocurrency Miners
13th Mar 2018 [3 months ago] from Microsoft
The surge in Bitcoin prices has driven widescale interest in cryptocurrencies. While the future of digital currencies is uncertain, they are shaking up the cybersecurity landscape as they continue to influence the intent and nature of attacks....
Behavior Monitoring Combined With Machine Learning Spoils A Massive Dofoil Coin Mining Campaign
7th Mar 2018 [3 months ago] from Microsoft
Just before noon on March 6 (PST), Windows Defender AV blocked more than 80,000 instances of several sophisticated trojans that exhibited advanced cross-process injection techniques, persistence mechanisms, and evasion methods. Behavior-based...
How Office 365 Protects Your Organization From Modern Phishing Campaigns
7th Mar 2018 [3 months ago] from Microsoft
This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security. We often allude to the benefits of having an integrated threat protection stack in Office 365. Today we wanted to take the opportunity to walk...
Tips For Getting Started On Your Security Deployment
6th Mar 2018 [3 months ago] from Microsoft
This blog is part of a series that responds to common questions we receive from customers about how to most effectively deploy Microsoft 365 Security. In this series youll find context, answers, and guidance for deployment and driving adoption...
The Role That Regions Can And Should Play In Critical Infrastructure Protection
5th Mar 2018 [4 months ago] from Microsoft
Todays report, Critical Infrastructure Protection in Latin America and the Caribbean 2018, developed in partnership between Microsoft and the Organization of American States (OAS), demonstrates the value of regional cooperation in global...
FinFisher Exposed: A Researcher’s Tale Of Defeating Traps, Tricks, And Complex Virtual Machines
1st Mar 2018 [4 months ago] from Microsoft
Office 365 Advanced Threat Protection (Office 365 ATP) blocked many notable zero-day exploits in 2017. In our analysis, one activity group stood out: NEODYMIUM. This threat actor is remarkable for two reasons: Its access to sophisticated...
Best Practices For Securely Moving Workloads To Microsoft Azure
26th Feb 2018 [4 months ago] from Microsoft
Azure is Microsofts cloud computing environment. It offers customers three primary service delivery models including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Adopting cloud technologies...
How To Mitigate Rapid Cyberattacks Such As Petya And WannaCrypt
21st Feb 2018 [4 months ago] from Microsoft
In the first blog post of this 3-part series, we introduced what rapid cyberattacks are and illustrated how rapid cyberattacks are different in terms of execution and outcome. In the second blog post, we provided some details on Petya and...
How A National Cybersecurity Agency Can Help Avoid A National Cybersecurity Quagmire
19th Feb 2018 [4 months ago] from Microsoft
This last October we saw more countries than ever participate in initiatives to raise cybersecurity awareness. What was once largely a US approach has evolved into events and initiatives around the world by governments, civil society groups,...
How Artificial Intelligence Stopped An Emotet Outbreak
14th Feb 2018 [4 months ago] from Microsoft
At 12:46 a.m. local time on February 3, a Windows 7 Pro customer in North Carolina became the first would-be victim of a new malware attack campaign for Trojan:Win32/Emotet. In the next 30 minutes, the campaign tried to attack over a thousand...
« Newer 1 2 3 4 5 6 7 8 Older »