Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'Microsoft' | www.SecurityPhresh.com
Security News from 'Microsoft'
Showing 'Security News from 'Microsoft'' from 71 to 80
FinFisher Exposed: A Researcher’s Tale Of Defeating Traps, Tricks, And Complex Virtual Machines
1st Mar 2018 [6 months ago] from Microsoft
Office 365 Advanced Threat Protection (Office 365 ATP) blocked many notable zero-day exploits in 2017. In our analysis, one activity group stood out: NEODYMIUM. This threat actor is remarkable for two reasons: Its access to sophisticated...
Best Practices For Securely Moving Workloads To Microsoft Azure
26th Feb 2018 [6 months ago] from Microsoft
Azure is Microsofts cloud computing environment. It offers customers three primary service delivery models including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Adopting cloud technologies...
How To Mitigate Rapid Cyberattacks Such As Petya And WannaCrypt
21st Feb 2018 [6 months ago] from Microsoft
In the first blog post of this 3-part series, we introduced what rapid cyberattacks are and illustrated how rapid cyberattacks are different in terms of execution and outcome. In the second blog post, we provided some details on Petya and...
How A National Cybersecurity Agency Can Help Avoid A National Cybersecurity Quagmire
19th Feb 2018 [6 months ago] from Microsoft
This last October we saw more countries than ever participate in initiatives to raise cybersecurity awareness. What was once largely a US approach has evolved into events and initiatives around the world by governments, civil society groups,...
How Artificial Intelligence Stopped An Emotet Outbreak
14th Feb 2018 [6 months ago] from Microsoft
At 12:46 a.m. local time on February 3, a Windows 7 Pro customer in North Carolina became the first would-be victim of a new malware attack campaign for Trojan:Win32/Emotet. In the next 30 minutes, the campaign tried to attack over a thousand...
Cyber Resilience For The Modern Enterprise
12th Feb 2018 [6 months ago] from Microsoft
Many organizations are undergoing a digital transformation that leverages a mix of cloud and on-premises assets to increase business efficiency and growth. While increased dependence on technology is necessary for this transformation, and...
Developing An Effective Cyber Strategy
7th Feb 2018 [6 months ago] from Microsoft
The word strategy has its origins in the Roman Empire and was used to describe the leading of troops in battle. From a military perspective, strategy is a top-level plan designed to achieve one or more high-order goals. A clear strategy...
Overview Of Petya, A Rapid Cyberattack
5th Feb 2018 [7 months ago] from Microsoft
In the first blog post of this 3-part series, we introduced what rapid cyberattacks are and illustrated how they are different in terms of execution and outcome. Next, we will go into some more details on the Petya (aka NotPetya) attack....
Protecting Customers From Being Intimidated Into Making An Unnecessary Purchase
30th Jan 2018 [7 months ago] from Microsoft
There has been an increase in free versions of programs that purport to scan computers for various errors, and then use alarming, coercive messages to scare customers into buying a premium version of the same program. The paid version of...
IGF Proves The Value Of Bottom-up, Multi-stakeholder Model In Cyberspace Policy-making
29th Jan 2018 [7 months ago] from Microsoft
In December, the Internet Governance Forum (IGF) brought the world together to talk about the internet. I tend to take a definite interest in cybersecurity, but there were many more important topics discussed. They ranged from diversity...
« Newer 2 3 4 5 6 7 8 9 10 11 Older »