-
Microsoft Cyber Signals report highlights spike in cybercriminal activity around business email compromise
A version of this article was first published on the Microsoft Stories. Read Original Article 38% increase in Cybercrime-as-a-Service targeting business email observed between 2019 and 2022 35 million business email compromise attempts, with an average of 156,000 attempts daily, detected and investigated by Microsoft Threat Intelligence between April 2022 and April 2023 ASIA PACIFIC…
-
Meeting governments where they are: Delivering innovation while maintaining digital sovereignty
A version of this article was first published on the Microsoft blog. Corey Sanders – Corporate Vice President, Microsoft Cloud for Industry Read Original Article As governments today look at technology innovation, there is a need to address the rapidly evolving demands of their citizens while protecting the most sensitive data and delivering on promises…
-
Anatomy of a modern attack surface
A version of this article was first published on the Microsoft blog. Read Original Article Six areas for organizations to manage As the world becomes more connected and digital, cybersecurity is becoming more complex. Organizations are moving more infrastructure, data, and apps to the cloud, supporting remote work, and engaging with third-party ecosystems. Consequently, what…
-
Reflecting on our responsible AI program: Three critical elements for progress
A version of this article was first published on the Microsoft blog. Natasha Crampton – Chief Responsible AI Officer Read Original Article Last week, at Responsible AI Leadership: Global Summit on Generative AI, co-hosted by the World Economic Forum and AI Commons, I had the opportunity to engage with colleagues from around the world who…
-
Stay compliant and protect sensitive data with Zero Trust security
A version of this article was first published on the Microsoft blog. Rudra Mitra Corporate Vice President, Microsoft Data Security and Compliance Read Original Article Regulatory standards frequently shift and tighten, especially with the rise of hybrid work environments. And with the explosion of data growth, organizations have seen a massive uptick in cybersecurity issues…
-
Simplified endpoint management with Microsoft Intune Suite: Adopting a long-term approach with intelligence and automation
A version of this article was first published on the Microsoft blog. Jason Roszak Chief Product Officer, Enterprise Management Read Original Article The last couple of years have been difficult, with many organizations operating in a response mode. From a global pandemic to an economic downturn to increasing security risks, teams are under more pressure…
-
DEV-0196: QuaDream’s “KingsPawn” malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia
A version of this article was first published on the Microsoft blog. Microsoft Threat Intelligence Read Original Article Microsoft Threat Intelligence analysts assess with high confidence that a threat group tracked by Microsoft as DEV-0196 is linked to an Israel-based private sector offensive actor (PSOA) known as QuaDream. QuaDream reportedly sells a platform they call…
-
Introducing Microsoft Security Copilot: Empowering defenders at the speed of AI
A version of this article was first published on the Microsoft blog. Singapore News Center Read Original Article The odds are against today’s defenders Today the odds remain stacked against cybersecurity professionals. Too often, they fight an asymmetric battle against prolific, relentless and sophisticated attackers. To protect their organizations, defenders must respond to threats that…
-
Stopping cybercriminals from abusing security tools
A version of this article was first published on the Microsoft blog. Amy Hogan-Burney – General Manager, Digital Crimes Unit Read Original Article Microsoft’s Digital Crimes Unit (DCU), cybersecurity software company Fortra™ and Health Information Sharing and Analysis Center (Health-ISAC) are taking technical and legal action to disrupt cracked, legacy copies of Cobalt Strike and abused…
-
5 Cybersecurity Best Practices for a Safe Remote Working Experience – VGC Technology
The pandemic brought about a new wave of paranoia, as employees were encouraged to work from home. While some companies are getting employees to get back to the office to work, most companies are continuing with remote working or adopting hybrid workplace arrangements. There is then an increased risk of cyber attacks and breaches as…