Microsoft Security

Microsoft Security Blog Expert coverage of cybersecurity topics

  • Microsoft at Legalweek: Help safeguard your AI future with Microsoft Purview​
    by Katerina Athanasiou on February 20, 2025 at 5:00 pm

    ​Connect with Microsoft at Legalweek 2025 to learn how to embrace AI while protecting your organization’s data with Microsoft Purview. ​ The post Microsoft at Legalweek: Help safeguard your AI future with Microsoft Purview​ appeared first on Microsoft Security Blog.

  • Microsoft is named a Leader in the 2025 GartnerÂŽ Magic Quadrant™ for cyber-physical systems protection platforms​​
    by Jason Weber on February 19, 2025 at 5:00 pm

    We are excited to announce that Gartner has named  Microsoft a Leader in the 2024 Gartner® Magic Quadrant™ for Cyber Physical Systems Protection Platforms. Gartner defines Cyber-physical systems (CPS) as “engineered systems that orchestrate sensing, computation, control, networking and analytics” that connect the digital and physical worlds. They span industrial control systems (ICS), OT devices, Internet of Things (IoT) devices, and more.    The post Microsoft is named a Leader in the 2025 GartnerÂŽ Magic Quadrant™ for cyber-physical systems protection platforms​​ appeared first on Microsoft Security Blog.

  • ​​Join us for the end-to-end Microsoft RSAC 2025 Conference experience
    by Dasha Zenkovich on February 18, 2025 at 5:00 pm

    Join Microsoft at RSAC 2025, where we will showcase end-to-end security designed to help organizations accelerate the secure adoption of AI. The post ​​Join us for the end-to-end Microsoft RSAC 2025 Conference experience appeared first on Microsoft Security Blog.

  • Storm-2372 conducts device code phishing campaign
    by Microsoft Threat Intelligence on February 14, 2025 at 1:00 am

    Microsoft Threat Intelligence Center discovered an active and successful device code phishing campaign by a threat actor we track as Storm-2372. Our ongoing investigation indicates that this campaign has been active since August 2024 with the actor creating lures that resemble messaging app experiences including WhatsApp, Signal, and Microsoft Teams. Storm-2372’s targets during this time have included government, non-governmental organizations (NGOs), information technology (IT) services and technology, defense, telecommunications, health, higher education, and energy/oil and gas in Europe, North America, Africa, and the Middle East. Microsoft assesses with medium confidence that Storm-2372 aligns with Russian interests, victimology, and tradecraft. The post Storm-2372 conducts device code phishing campaign appeared first on Microsoft Security Blog.

  • Securing DeepSeek and other AI systems with Microsoft Security
    by Herain Oberoi on February 13, 2025 at 5:00 pm

    Microsoft Security provides cyberthreat protection, posture management, data security, compliance and governance, and AI safety, to secure AI applications that you build and use. These capabilities can also be used to secure and govern AI apps built with the DeepSeek R1 model and the use of the DeepSeek app.  The post Securing DeepSeek and other AI systems with Microsoft Security appeared first on Microsoft Security Blog.

  • The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation
    by Microsoft Threat Intelligence on February 12, 2025 at 5:00 pm

    Microsoft is publishing for the first time our research into a subgroup within the Russian state actor Seashell Blizzard and its multiyear initial access operation, tracked by Microsoft Threat Intelligence as the “BadPilot campaign”. This subgroup has conducted globally diverse compromises of Internet-facing infrastructure to enable Seashell Blizzard to persist on high-value targets and support tailored network operations. The post The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation appeared first on Microsoft Security Blog.

  • Build a stronger security strategy with proactive and reactive incident response: Cyberattack Series
    by Microsoft Incident Response on February 10, 2025 at 5:00 pm

    Find out how a cyberattack by Storm-2077 was halted faster because the Microsoft Incident Response team is both proactive and reactive at the same time. The post Build a stronger security strategy with proactive and reactive incident response: Cyberattack Series appeared first on Microsoft Security Blog.

  • Code injection attacks using publicly disclosed ASP.NET machine keys
    by Microsoft Threat Intelligence on February 6, 2025 at 6:00 pm

    Microsoft Threat Intelligence observed limited activity by an unattributed threat actor using a publicly available, static ASP.NET machine key to inject malicious code and deliver the Godzilla post-exploitation framework. In the course of investigating, remediating, and building protections against this activity, we observed an insecure practice whereby developers have incorporated various publicly disclosed ASP.NET machine keys from publicly accessible resources, such as code documentation and repositories, which threat actors have used to launch ViewState code injection attacks and perform malicious actions on target servers. The post Code injection attacks using publicly disclosed ASP.NET machine keys appeared first on Microsoft Security Blog.

  • Hear from Microsoft Security experts at these top cybersecurity events in 2025
    by Benjamin Lim on February 3, 2025 at 5:00 pm

    Security events offer a valuable opportunity to learn about the latest trends and solutions, evolve your skills for cyberthreats, and meet like-minded security professionals. See where you can meet Microsoft Security in 2025. The post Hear from Microsoft Security experts at these top cybersecurity events in 2025 appeared first on Microsoft Security Blog.

  • 3 priorities for adopting proactive identity and access security in 2025
    by Joy Chik on January 28, 2025 at 5:00 pm

    Adopting proactive defensive measures is the only way to get ahead of determined efforts to compromise identities and gain access to your environment. The post 3 priorities for adopting proactive identity and access security in 2025 appeared first on Microsoft Security Blog.

Share Websitecyber