ŋıŋʝąƈąɬ 

@RavivTamir

CyberNinjaCat Herder, MSFT is a security company, while at work nurturing Microsoft Threat Protection, opinions r my own

Redmond, WA
Vrijeme pridruživanja: listopad 2013.

Tweetovi

Blokirali ste korisnika/cu @RavivTamir

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @RavivTamir

  1. proslijedio/la je Tweet
    31. sij

    Potentially unwanted applications (PUA) are not considered malware, but they might perform actions on endpoints which adversely affect endpoint performance or use. We are adding protection against such PUA downloads in the next version of Microsoft Edge via Defender SmartScreen.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Need a Reference Architecture? Check out this one showing how technology enables this strategy/access model. Slide 14 of CISO Workshop Module 3

    Poništi
  3. 28. sij

    Data Awareness Is Key to Data Security. New blog post from my boss.

    Poništi
  4. proslijedio/la je Tweet
    27. sij

    New: leaked documents, data, contracts show how hugely popular antivirus Avast now harvests internet browsing data and sells it for millions of dollars. Clients included Home Depot, Google, Microsoft. Documents show a product called "All Clicks Feed"

    Prikaži ovu nit
    Poništi
  5. 17. sij

    Proud to be part of Microsoft today

    Poništi
  6. 15. sij

    New threat analytics report for CVE-2020-0601 is available in your MDATP portal. making sure you r informed and know which devices in your org are affected

    Poništi
  7. proslijedio/la je Tweet
    15. sij

    Microsoft Defender ATP Threat & Vulnerability Management discovers CVE-2020-0601 and maps it into relevant threat analytics report and active EDR alerts. Now that's awesome.

    Poništi
  8. proslijedio/la je Tweet
    15. sij

    THIS...is one of the many reasons why I absolutely LOVE . But even if you already have it, please patch your system(s).

    Poništi
  9. 15. sij

    Now is a good time to patch. EDR capabilities in Microsoft Defender ATP raises alerts for attempts to exploit CVE-2020-0601 and anomalous file signatures.

    Poništi
  10. proslijedio/la je Tweet
    14. sij

    To all Windows users everywhere - patch your systems now! ( and have coverage for attempted exploitation of CVE-2020-0601).

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    14. sij

    Windows Defender Antivirus detects files w/crafted certificates exploiting the certificate validation vulnerability: ​Exploit:Win32/CVE-2020-0601.A (PE files) Exploit:Win32/CVE-2020-0601.B (Scripts) Also, Defender ATP has a threat report on your posture. -2020-0601

    Poništi
  12. 1. sij

    Hey Daniel, can we do visualization of result sets? What about visualization of anomalies in result sets?

    Poništi
  13. proslijedio/la je Tweet
    28. pro 2019.
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    20. pro 2019.

    Create custom reports using Microsoft Defender ATP APIs and Power BI: Typical enterprise security operation teams often rely on dependable reporting visualisations to make critical security decisions. While Microsoft Defender ATP…

    Poništi
  15. proslijedio/la je Tweet
    20. pro 2019.

    Short & sweet educational videos for Microsoft Defender ATP: Delivering on our mission to help customers take full advantage of Microsoft Defender ATP capabilities, we're continuously adding new features to the platform. Check out…

    Poništi
  16. proslijedio/la je Tweet
    20. pro 2019.

    EDR capabilities for macOS have now arrived:   We are excited to announce that Microsoft Defender Advanced Threat Protection (ATP) endpoint and detection response (EDR) capabilities for macOS devices are now generally available. We…

    Poništi
  17. Excellent article from Chris on how to hunt across endpoint and email raw data with Microsoft Threat Protection - unified hunting -

    Poništi
  18. proslijedio/la je Tweet

    New blog post: Microsoft Threat Protection - unified hunting. is here! Combining @WindowsATP, , , and , it can be used to correlate data in the new security portal. Read what you can do with unified hunting.

    Poništi
  19. proslijedio/la je Tweet
    16. pro 2019.

    🔥 Have a look how Threat and Vulnerability Management helps your IT & security teams work better together to make your organization more secure. 🤝

    Poništi
  20. proslijedio/la je Tweet
    13. pro 2019.

    As people get better at spotting phishing (yes, I know, probably still not good enough), phishing gets more sophisticated. Here's some insight from our Office 365 threat research team on just how sophisticated it has gotten:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·