Microsoft

91% of critical incidents involve known, legitimate binaries like PowerShell
Opportunistic threat actors are leveraging trusted tools, like PowerShell, to retrieve and execute malicious code from remote sources. According to eSentire, 91% of endpoint …
Zscaler announces integration with Microsoft Cloud app security
Zscaler announced closed-loop integration with Microsoft Cloud App Security. The Zscaler platform-Microsoft Cloud App Security integration feature set delivers the security of …

Microsoft offers new Azure AD tool to nix easily guessed passwords
Predictable, easy-to-guess passwords are often the weak link that ends up breaking the security chain and attackers know this. “They know to account for character …

Inferring Internet security posture by country through port scanning
In this podcast, Tod Beardsley, Director of Research at Rapid7, talks about the recently released National Exposure Index, which aims to better understand the nature of …
Pulse Secure extends capabilities for Microsoft Azure
Pulse Secure announced an enhancement to its hybrid IT strategy allowing enterprises to deploy and uniformly manage physical, virtual and cloud-based Pulse Secure Appliances …

IoT connections to grow 140%, will reach 50 billion by 2022
New data has revealed that the total number of connected IoT sensors and devices is set to exceed 50 billion by 2022, up from an estimated 21 billion in 2018. Juniper Research …

Overview: Microsoft June 2018 Patch Tuesday
It’s that time of the month again when Microsoft releases patches for its software. The June 2018 updates fix 50 vulnerabilities, 12 of which are critical. The company …

Patch management is not just IT’s responsibility, get your whole team on board
I have been on the road for a few weeks now and surprisingly the topic of discussion has predominantly been patch management. Why is patch such a prevalent topic? Patching …

Microsoft will extend GDPR rights to customers worldwide
Microsoft has announced it will extend the rights that are at the heart of GDPR to all of their consumer customers worldwide. “Known as Data Subject Rights, they include …

New Spectre-like flaw found in CPUs using speculative execution
A new flaw that can allow an attacker to obtain access to sensitive information on affected systems has been discovered in modern CPUs. CVE-2018-3639, discovered by …

May 2018 Patch Tuesday forecast: Where are the flowers?
The wintry weather doesn’t want to give up its hold on us here in the US. The extended cold has kept the spring flowers from blooming, dragging out the winter blues. It …

Anomali collaborates with Microsoft to integrate threat data
Threat management solutions provider Anomali announced a collaboration with Microsoft to integrate threat intelligence from the Anomali ThreatStream platform with the security …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility