Category: Microsoft Security Blog

Navigating NIS2 requirements with Microsoft Security solutions

​​NIS2 is the most comprehensive European cybersecurity directive yet, covering 18 sectors and 160,000+ companies. The Zero Trust principles addressed by Microsoft Security solutions can help you protect your organization and meet NIS2 requirements. The post Navigating NIS2 requirements with…

Staying ahead of threat actors in the age of AI

Microsoft, in collaboration with OpenAI, is publishing research on emerging threats in the age of AI, focusing on identified activity associated with known threat actors Forest Blizzard, Emerald Sleet, Crimson Sandstorm, and others. The observed activity includes prompt-injections, attempted misuse…

Join us at InfoSec Jupyterthon 2024

Jupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center (SOC) tools. Notebooks can be used interactively for threat detection and response, or as automated tasks in a larger…

5 ways to secure identity and access for 2024

To confidently secure identity and access at your organization, here are five areas Microsoft recommends prioritizing in the new year.​ The post 5 ways to secure identity and access for 2024 appeared first on Microsoft Security Blog. This article has…

Financially motivated threat actors misusing App Installer

Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, including financially motivated actors like Storm-0569, Storm-1113, Sangria Tempest, and Storm-1674, utilizing the ms-appinstaller URI scheme (App Installer) to distribute malware. The post Financially motivated threat actors misusing App Installer…