incident response

  1. TA17-164A: HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure

    Original release date: June 13, 2017 Systems Affected Networked Systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert provides technical details on the...
  2. TA17-132A: Indicators Associated With WannaCry Ransomware

    Original release date: May 12, 2017 | Last revised: May 13, 2017 Systems Affected Microsoft Windows operating systems Overview According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in as...
  3. K

    Windows Server Files Auditing - Tracking File Tampering/ Data Loss prevention

    We anticipate threats like files being deleted from servers by disgruntled employees. 1. Can someone suggest what preventive measures that can be implemented ? (DLP implementation is in pipeline, but would like to see if there are alternate measures) 2. If somehow files are deleted, we would...
  4. VIDEO Announcing Windows Defender Advanced Threat Protection

    We designed Windows 10 from the very beginning to be our most secure platform ever. With features like Credential Guard, Device Guard, Windows Hello, and Enterprise Data Protection, Windows 10 offers unique defenses from attacks. Windows Defender, our free anti-malware service, provides...
  5. TA15-314A: Web Shells – Threat Awareness and Guidance

    Original release date: November 10, 2015 Systems Affected Web servers that allow web shells Overview This alert describes the frequent use of web shells as an exploitation vector. Web shells can be used to obtain unauthorized access and can lead to wider network compromise. This alert...
  6. August 2015 Security Update Release Summary

    Today we released security updates to provide protections against malicious attackers. As a best practice, we encourage customers to apply security updates as soon as they are released. More information about this month’s security updates and Link Removed can be found in the Security TechNet...
  7. TA15-119A: Top 30 Targeted High Risk Vulnerabilities

    Original release date: April 29, 2015 Systems Affected Systems running unpatched software from Adobe, Microsoft, Oracle, or OpenSSL. Overview Cyber threat actors continue to exploit unpatched software to conduct attacks against critical infrastructure organizations. As many as 85 percent of...
  8. Driving a Collectively Stronger Security Community with Microsoft Interflow

    Today, Microsoft is pleased to announce the private preview of Link Removed, a security and threat information exchange platform for analysts and researchers working in cybersecurity. Interflow uses industry specifications to create an automated, machine-readable feed of threat and security...
  9. MSRC looks back at ten years, and the February 2012 bulletins

    Ever wondered where Update Tuesday bulletins come from, or what it’s like around Microsoft when a serious information-security situation arises? Or wondered who precisely is responsible for getting your monthly bulletin releases out the door? Update Tuesday, which brings us here today, is...
  10. MS10-072 - Important: Vulnerabilities in SafeHTML Could Allow Information Disclosure (2412048)

    Bulletin Severity Rating:Important - This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft SharePoint and Windows SharePoint Services. The vulnerabilities could allow information disclosure if an attacker submits specially...
  11. VIDEO 7 Things Every CEO Should Know About Information Security

  12. Windows 7 Computer security

    http://en.wikipedia.org/wiki/Computer_security The technologies of computer security are based on Link Removed due to 404 Error. As security is not necessarily the primary goal of most computer applications, designing a program with security in mind often imposes restrictions on that program's...