Microsoft Security Intelligence

@MsftSecIntel

We are Microsoft's global network of security experts. Follow for security research, intelligence, and Microsoft Threat Protection news.

Redmond, WA
Vrijeme pridruživanja: studeni 2010.

Tweetovi

Blokirali ste korisnika/cu @MsftSecIntel

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MsftSecIntel

  1. Microsoft Defender SmartScreen blocks the website hosting the coin miner. Microsoft Defender ATP detects the malicious HTML file as Trojan:HTML/Brocoiner.N!lib (SHA-256: 86031a7d35968a1ff1f20441afce6eee504cdb98c1fbee9a4708ad989a5f2269)

    Prikaži ovu nit
    Poništi
  2. While the world mourns the loss of an NBA legend, cybercriminals are, as expected, taking advantage of the tragedy. We found a malicious HTML file posing as a Kobe Bryant wallpaper that contains a coin mining script.

    Prikaži ovu nit
    Poništi
  3. Dudear SHA-256: b81302bc5cbfeddf3b608a60b25f86944eddcef617e733cddf0fc93ee4ccc7ab, bf86ccaf5e7f20124a259212a3a78dae12ec2594f48d5256a01323c772abc606, d75c0e88f203dce04e7c90a32a17cee25e5d3acbb5add7c33d257b8600281f2b

    Prikaži ovu nit
    Poništi
  4. IoCs: HTML SHA-256: 44ffbe69f8f189de7fa4f794686241ee4c814de90681bfff0a37e344ed12954e, 63c137ed882560ba03b7333a49b0714990c581f4e8a1b7579b339c74f465aa03, 6dee4408f563522f7fe5efb9891c409827643039bf7c8cd17c0d80bcc2997ece

    Prikaži ovu nit
    Poništi
  5. The Microsoft Defender ATP research team has also released a Threat Analytics report that customers can use to get technical info about the techniques and tools used by the threat, the impact to the organization, advanced hunting queries, mitigation status, and recommendations.

    Prikaži ovu nit
    Poništi
  6. Microsoft Threat Protection provides comprehensive protection against Dudear. Office 365 ATP detects malicious attachments and URLs used in emails. On endpoints, Microsoft Defender ATP detects and blocks the malicious HTML and Excel files and payload.

    Prikaži ovu nit
    Poništi
  7. This is the first time that Dudear is observed using HTML redirectors. The attackers use HTML files in different languages. Notably, they also use an IP traceback service to track the IP addresses of machines that download the malicious Excel file.

    Prikaži ovu nit
    Poništi
  8. The new campaign uses HTML redirectors attached to emails. When opened, the HTML leads to the download Dudear, a malicious macro-laden Excel file that drops the payload. In contrast, past Dudear email campaigns carried the malware as attachment or used malicious URLs.

    Prikaži ovu nit
    Poništi
  9. Dudear (aka TA505/SectorJ04/Evil Corp), used in some of the biggest malware campaigns today, is back in operations this month after a short hiatus. While we saw some changes in tactics, the revived Dudear still attempts to deploy the info-stealing Trojan GraceWire.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet

    To allow customers to use various sources of web content categorization data, Microsoft Defender ATP integrates with Cyren, the first data provider partner for this functionality. More info documented here:

    Prikaži ovu nit
    Poništi
  11. Microsoft CVP of Identity shares five areas to prioritize in 2020, and one technology to watch:

    Poništi
  12. To allow customers to use various sources of web content categorization data, Microsoft Defender ATP integrates with Cyren, the first data provider partner for this functionality. More info documented here:

    Prikaži ovu nit
    Poništi
  13. With the web content filtering feature in Microsoft Defender ATP, now in public preview, security admins can configure policies to block or gather access data on certain content categories across machine groups

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    Evaluate your TLS 1.2 readiness and develop a migration plan with the testing described here:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet

    Happy ! Today is a great time to assess your company privacy policies to ensure you comply with local and regional regulations. Read this blog to learn how:

    Poništi
  16. "Unifying security and compliance under a new model of data-aware threat protection will enable businesses to create trust while reducing risk to users and data." -- Moti Gindi, Microsoft Defender ATP CVP, via

    Poništi
  17. Microsoft Defender ATP's partner ecosystem expands with integrations for network access control, network threat protection, continuous security validation, security orchestration automation and response, web content filtering, threat intelligence

    Poništi
  18. proslijedio/la je Tweet
    27. sij

    sLoad, the PowerShell-based Trojan downloader notable for its almost exclusive use of the Background Intelligent Transfer Service (BITS) for malicious activities, has launched version 2.0. Read about what's changed in our new blog:

    Poništi
  19. proslijedio/la je Tweet

    . CVP Moti Gindi shares tips in for bringing security and compliance together for stronger protection.

    Poništi
  20. New assessments available in the public preview of Microsoft Compliance Score help assess your compliance posture for ISO/IEC 27701:2019, California Consumer Privacy Act (CCPA), Brazil Lei Geral de Proteção de Dados (LGPD), SOC 1 Type 2 and SOC 2 Type 2:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·