October 18, 2024

New macOS vulnerability, “HM Surf”, could lead to unauthorized data access

Microsoft Threat Intelligence uncovered a macOS vulnerability that could potentially allow an attacker to bypass the operating system’s Transparency, Consent, and Control (TCC) technology and gain […]
October 11, 2024

​​Cyber Signals Issue 8 | Education under siege: How cybercriminals target our schools​​

Introduction | Security snapshot | Threat briefingDefending against attacks | Expert profile  Education is essentially an “industry of industries,” with K-12 and higher education enterprises handling […]
October 9, 2024

File hosting services misused for identity phishing

Microsoft has observed campaigns misusing legitimate file hosting services increasingly use defense evasion tactics involving files with restricted access and view-only restrictions. While these campaigns are […]
October 8, 2024

Microsoft Defender for Cloud remediated threats 30% faster than other solutions, according to Forrester TEI™ study

The broad adoption of multicloud and hybrid infrastructures has introduced new complexity to the cloud estates of many businesses. With this complexity comes a broader attack […]
September 27, 2024

Storm-0501: Ransomware attacks expanding to hybrid cloud environments

Microsoft has observed the threat actor tracked as Storm-0501 launching a multi-staged attack where they compromised hybrid cloud environments and performed lateral movement from on-premises to […]
September 26, 2024

​​Microsoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms

Since 2023, Microsoft has seen a 2.75 times increase in the number of organizations encountering ransomware campaigns.1 And up to 90% of successful ransomware campaigns leverage […]
September 26, 2024

Activate your data responsibly in the era of AI with Microsoft Purview

This week, teams across Microsoft Fabric and Microsoft Purview are gathered in Stockholm, Sweden, for the inaugural European Microsoft Fabric Community Conference. Attendees are in for […]