Original release date: April 27, 2017
Systems Affected
Networked Systems
Overview
The National Cybersecurity and Communications Integration Center (NCCIC) has become aware of an emerging sophisticated campaign, occurring since at least May 2016, that uses multiple malware implants. Initial...
In this video Seth Moore describes another benefit of the Windows 10 Isolated User Mode: credential theft mitigation. He first describes the kinds of credentials that can be stolen and how a hacker gains access to them. He then describes how the Windows 10 Isolated User Mode prevents the typical...
access control
compromise
computing environment
credentialtheft
cybersecurity
hacking
innovation
isolated user mode
mitigation
protection
security
seth moore
tech insights
user mode
user vigilance
video
windows 10
windows kernel
Original release date: April 09, 2015
Systems Affected
Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8
Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012
Overview
AAEH is a family of polymorphic downloaders created with the primary purpose of downloading other...
Lex Thomas welcomes Mark Simos, an Architect for the Cyber, Security and Identity team here at Microsoft, to discuss tools, techniques and services that are available to help mitigate “Pass-the-Hash” and other forms of cyber credential theft. Tune in as they give us an in-depth overview of the...
active directory
cloud solutions
credentialtheft
cybersecurity
identity management
it architecture
microsoft
network security
pass-the-hash
podcast
privileged access
security features
security guide
security software
system center
teched
threat mitigation
virtualization
windows 10
windows server
Original release date: November 13, 2014
Systems Affected
iOS devices running iOS 7.1.1, 7.1.2, 8.0, 8.1, and 8.1.1 beta.
Overview
A technique labeled “Masque Attack” allows an attacker to substitute malware for a legitimate iOS app under a limited set of circumstances.
Description...
Many around the globe have been following the 2014 FIFA World Cup Brazil™ closely. Regardless of which country you are supporting, many folks have been impressed by the defensive display put on by keeper Tim Howard in a loss against Belgium. It was a great performance highlighting a strong...
adobe flash
browser upgrade
bulletin
credentialtheft
critical
cve
enterprise security
important
internet explorer
moderate
protected mode
remote code execution
security
server security
smartscreen
update
vulnerabilities
webcast
windows
windows journal
Original release date: June 02, 2014
Systems Affected
Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8
Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012
Overview
GameOver Zeus (GOZ), a peer-to-peer (P2P) variant of the Zeus family of bank credential-stealing malware...
Revision Note: V1.0 (May 13, 2014): Advisory published.
Summary: Microsoft is announcing the availability of an update for supported editions of Windows 8, Windows RT, Windows Server 2012, Windows 7, and Windows Server 2008 R2 that improves credential protection and domain authentication...
2014
authentication
client computer
credentialtheftcredentials
credssp
domain user
lsa
management
microsoft
policy enforcement
protection
restricted admin
security
server 2008
server 2012
update
windows 7
windows 8
windows rt
Revision Note: V1.0 (May 13, 2014): Advisory published.
Summary: Microsoft is announcing the availability of an update for supported editions of Windows 8, Windows RT, Windows Server 2012, Windows 7, and Windows Server 2008 R2 that improves credential protection and domain authentication...