New features provide peace of mind, help you stay in the flow and connect to the information you want
The last few weeks have been unlike anything I’ve ever experienced. As a working mom I’m certainly used to having a full schedule, getting pulled in different directions, balancing the needs...
4k streaming
browser
collections
data protection
dolby audio
features
give mode
immersive reader
inprivate mode
microsoft edge
microsoft rewards
online security
password monitor
privacy
research
smart copy
tracking prevention
user experience
vertical tabs
web browsing
around 2 days ago i saw a file on my desktop (debug.log). i didnt know anything about it so i did a little research and found out that it is most likely made by google chrome due to some error. i tried to delete it but failed. i didnt notice any problems so i ignored it.
today 2 times i got a...
Microsoft has been investigating recent attacks by malicious actors using the Dopplepaymer ransomware. There is misleading information circulating about Microsoft Teams, along with references to RDP (BlueKeep), as ways in which this malware spreads. Our security research teams have investigated...
actors
attacks
bluekeep
cybersecurity
dopplepaymer
guidance
information
investigation
malware
microsoft
misleading
prevention
protection
ransomware
rdp
research
security
teams
threats
vulnerabilities
We hope you enjoyed the first day of our BlueHat briefings and the Bytes of BlueHat reception in our glamping tent (complete with toasted marshmallows). Yesterday, we learned a lot about how XboxOne hardware security has advanced the state of hardware security elsewhere, we heard some surprising...
In the past year we invested a lot of time making Hyper-V research more accessible to everyone. Our first blog post, “First Steps in Hyper-V Research”, describes the tools and setup for debugging the hypervisor and examines the interesting attack surfaces of the virtualization stack components...
2019 has seen a phenomenal BlueHatIL in February followed by a wildly successful BlueHat Shanghai in May… now it’s time to come back home for BlueHat Seattle! 2 days of hands-on technical training (October 22-23, 2019) 2 days of conference talks from industry-leading security researchers and...
This week, we released the first Beta preview of the next version of Microsoft Edge. Alongside this, Microsoft is excited to announce the launch of the Microsoft Edge Insider Bounty Program. We welcome researchers to seek out and disclose any high impact vulnerabilities they may find in the next...
Azure is exceptionally secure. To help keep it that way, we are doubling the top bounty reward for Azure vulnerabilities to $40,000. But we aren’t stopping there. To make it easier for security researchers to confidently and aggressively test Azure, we are inviting a select group of talented...
Hyperledger executive director Brian Behlendorf and his team are working to advance cross-industry blockchain technologies through engaging enterprise developers.
Continue reading...
Earlier this week Link Removed brought together security researchers and hundreds of cybersecurity professionals from China and across Asia to explore the latest topics in cybersecurity research. Including presentations from Qihoo 360, Baidu, Alibaba and the Chinese Academy of Sciences, BlueHat...
There are many dedicated people and organizations who contribute to the protection and security of our common customers. For years, Microsoft has recognized security researchers for helping protect the ecosystem. Now, we’re announcing the launch of a new program to better recognize and thank...
awards
black hat
contribution
disclosure
ecosystem
evangelism
indicators
mapp
microsoft
partners
program
protection
recognition
research
response
security
strategist
threat
updates
vulnerabilities
Original release date: May 02, 2019
Summary
The Cybersecurity and Infrastructure Security Agency (CISA) is issuing this activity alert in response to recently disclosed exploits that target unsecure configurations of SAP components. [1]
Technical Details
A presentation at the April 2019...
access control
acls
cisa
configuration
cybersecurity
exploits
internet exposure
message server
mitigation
network security
os commands
presentation
remote code execution
research
routing
sap
security recommendations
security tools
snc
vulnerabilities
Link Removed
In 2018 The Microsoft Bounty Program awarded over $2,000,000 to encourage and reward external security research in key technologies to protect our customers. Building on that success, we are excited to announce a number of improvements in our bounty programs to better serve the...
The Microsoft Security Response Center (MSRC) recently announced our first BlueHat security conference in Shanghai which will take place on May 29-30, 2019. After 15 years of BlueHat events in Redmond, Washington and Israel, we are thrilled to expand to a new location. We work with many talented...
Threat trends based on Trend Micros research and data protection network.
Mapping the Future: Dealing With Pervasive and Persistent Threats - Security Predictions - Trend Micro USA
Microsoft Corp. is releasing a service to help health-care companies move vast amounts of patient data to its cloud and connect with other related systems in a bid to offer clinicians, individuals and researchers a more comprehensive view of patient health.
Continue reading...
Last week at BlueHat’s “MSRC Listens” session, I took the stage with Mechele Gruhn, manager of the Vulnerability Response PM team, to explain how MSRC is changing our communication, workflows, and tooling to deliver an improved user experience for our partners in the security research community...
We have tabulated the results from April-June 2018. The Top 5 Bounty Hunters for Q4 are now in. As with our list from Q3, we want to recognize both the leaders in payouts and in number of successful submissions. We appreciate the hard work and dedication of the following individuals and...
april 2018
ashar javed
awards
blackhat
bounty hunters
bug bounty
cameron vincent
june 2018
marcin towalski
microsoft
msrc
payouts
qihoo 360
recognition
research
security
security researchers
submissions
top 5
vulcan team
Hey everyone — I hope this month’s blog post finds you well!
Today, we are welcoming the solstice in the U.S., and I am very much looking forward to summer in Seattle. In addition to some planned vacation time, I will also be working with our team and partners on some exciting product...
augmented reality
awe
blog
business applications
contextual data
digital transformation
firstline workers
intelligent cloud
intelligent edge
iot
june 2018
microsoft
mixed reality
remote assistance
research
robotics
spatial planning
survey
update
workplace