Bookmark this page to find information on trending security topics.
Microsoft Security Tips and Talk
Unable to display feed at this time.
Microsoft Malware Protection Center
- Microsoft to remove WoSign and StartCom certificates in Windows 10 August 8, 2017Microsoft has concluded that the Chinese Certificate Authorities (CAs) WoSign and StartCom have failed to maintain the standards required by our Trusted Root Program. Observed unacceptable security practices include back-dating SHA-1 certificates, mis-issuances of certificates, accidental certificate revocation, duplicate certificate serial numbers, and mult […]
- Links in phishing-like emails lead to tech support scam August 7, 2017Tech support scams continue to evolve, with scammers exploring more ways to reach potential victims. Recently, we have observed spam campaigns distributing links that lead to tech support scam websites. Anti-spam filters in Microsoft Exchange Online Protection (EOP) for Office 365 and in Outlook.com blocked the said emails because they bore characteristics o […]
- Windows Defender ATP machine learning: Detecting new and unusual breach activity August 3, 2017Microsoft has been investing heavily in next-generation security technologies. These technologies use our ability to consolidate large sets of data and build intelligent systems that learn from that data. These machine learning (ML) systems flag and surface threats that would otherwise remain unnoticed amidst the continuous hum of billions of normal events a […]
- Windows Defender Antivirus cloud protection service: Advanced real-time defense against never-before-seen malware July 18, 2017For cybercriminals, speed is the name of the game. It takes newly released malware an average of just four hours to achieve its goal—steal financial information, extort money, or cause widespread damage. In a recent report, the Federal Trade Commission (FTC) said that cybercriminals will use hacked or stolen information within nine minutes of posting in... […]
- Detecting stealthier cross-process injection techniques with Windows Defender ATP: Process hollowing and atom bombing July 13, 2017Advanced cyberattacks emphasize stealth and persistence: the longer they stay under the radar, the more they can move laterally, exfiltrate data, and cause damage. To avoid detection, attackers are increasingly turning to cross-process injection. Cross-process injection gives attackers the ability to run malicious code that masquerades as legitimate programs […]
Kapersky Lab Threat Post
- Vendor Exposes Backup of Chicago Voter Roll via AWS Bucket August 18, 2017Voter registration data belonging to the entirety of Chicago’s electoral roll—1.8 million records—was found a week ago in an Amazon Web Services bucket.
- It’s Not Exactly Open Season on the iOS Secure Enclave August 18, 2017Despite yesterday's leak of the Apple iOS Secure Enclave decryption key, experts are urging calm over claims of an immediate threat to user data.
- Threatpost News Wrap, August 18, 2017 August 18, 2017Mike Mimoso and Tom Spring discuss this week's security news, including a discussion on recent hijacking of popular Chrome extensions and Adobe's decision to end-of-life Flash Player.
- Hacker Publishes iOS Secure Enclave Firmware Decryption Key August 18, 2017A hacker identified only as xerub published the decryption key unlocking the iOS Secure Enclave Processor.
- Cisco Patches Privilege Escalation Bugs in APIC August 17, 2017Cisco patched two high-severity vulnerabilities in its Cisco Application Policy Infrastructure Controller (APIC) that could allow an attacker to elevate privileges on the host machine.