Bypassing Windows Defender Application Control (WDAC) might sound like something reserved for blockbuster spy movies, but in today’s threat landscape, it’s a real, high-stakes game played by red teams and security researchers alike. At the heart of this article is the in-depth exploration of...
Microsoft’s Request for a Video POC: A Rigid Process Under Scrutiny
A recent incident has spotlighted a curious practice at the Microsoft Security Response Center (MSRC) that may be prompting questions about the balance between thoroughness and red tape in vulnerability disclosure. Senior...
The Microsoft Security Response Center (MSRC) is pleased to announce the launch of the Link Removed program, a program dedicated to providing rock-solid security for our DevOps customers. Starting January 17, 2019, we’re excited to offer rewards up to US$20,000 for eligible vulnerabilities in...
azure devops
bounty program
bug bounty
cloud service
code submission
collaborative coding
community engagement
developer community
development lifecycle
microsoft
msrc
online services
product improvement
public acknowledgment
recognition
rewards
securitysecurityresearch
software development
vulnerabilities
Today, Microsoft is announcing the launch of a limited-time bounty program for speculative execution side channel vulnerabilities. This new class of vulnerabilities was disclosed in January 2018 and represented a major advancement in the research in this field. In recognition of that threat...
For the second in this series of blog entries we want to look into which vulnerability reports make it into the monthly release cadence.
It may help to start with some history. In September 2003 we made a change from a release anytime approach to a mostly predictable, monthly release cadence...
This is the first of a series of blog entries to give some insight into the Microsoft Security Response Center (MSRC) business and how we work with security researchers and vulnerability reports.
The Microsoft Security Response Center actively recognizes those security researchers who help us...
Today’s security updates include three updates that exemplify how the security ecosystem can come together to help protect consumers and enterprises. We would like to thank FireEye and ESET for working with us.
Customers that have the latest security updates installed are protected against the...
I’m very happy to announce another addition to the Link Removed. Microsoft will be hosting a bounty for Remote Code Execution vulnerabilities in Microsoft Edge on Windows Insider Preview builds.
This bounty continues our partnership with the security research community in working to secure our...
bounty payouts
bounty programs
chakra
microsoft
microsoft edge
open source
osa
penetration testing
pre-release
remote code execution
research
sdl
securitysecurityresearch
software development
user community
vulnerabilities
windows features
windows insider
I am very pleased to be releasing additional expansions of the Link Removed. Please stop by the Microsoft Networking Lounge at Black Hat, August 5-6, to learn more about these programs; or, visit Link Removed. We are raising the Bounty for Defense maximum from $50,000 USD to $100,000 USD. I am...
authentication
azure active directory
black hat
bounty programs
bug bounty
community feedback
contest
defense bounty
las vegas
microsoft
microsoft account
networking lounge
online services
payouts
penetration testing
remoteapp
research community
sdl
securityresearch
vulnerabilities
By way of introduction, I am Chris Betz, the leader of the Microsoft Security Response Center (MSRC). I’m stepping in to fill the shoes of Mike Reavey, who has moved on to become the General Manager of Secure Operations, still within Trustworthy Computing.
Since joining the MSRC, I’ve spent...
bounty program
chris betz
customer concerns
cyber-attacks
enterprise security
global team
it professionals
microsoft
microsoft security
msrc
professional dedication
progress report
response
securitysecurityresearch
technology evolution
trustworthy computing
update tuesdays
vulnerability
By way of introduction, I am Chris Betz, the leader of the Microsoft Security Response Center (MSRC). I’m stepping in to fill the shoes of Mike Reavey, who has moved on to become the General Manager of Secure Operations, still within Trustworthy Computing.
Since joining the MSRC, I’ve spent...
bounty program
chris betz
customer protection
cyber attacks
dedication
enterprise security
global team
information security
it professionals
microsoft
msrc
progress report
response
securitysecurity incident
securityresearch
technology
trustworthy computing
update tuesdays
vulnerability
Protecting the general computing ecosystem is a really tough job, and given some of the media headlines, it’s easy to get discouraged and wallow in the problems. It seems like we’re constantly bombarded with statistics measuring the number of bugs, vulnerabilities, or attacks in an...
active protections program
bluehat prize
cash prizes
collaboration
computing ecosystem
customer solutions
cybersecurity
defensive technology
exploit mitigation
global security
incentives
industry collaboration
innovation
microsoft
research community
security challenges
security providers
securityresearch
threat landscape
vulnerabilities
Hi everyone. Mike Reavey from the MSRC here. Today we're releasing our Link Removed due to 404 Error for the December 2010 security bulletin release. As we do every month, we've given information about the coming December release and provided links to detailed information so you can plan your...
aslr
critical updates
customer feedback
december 2010
dep
end of support
important updates
internet explorer
microsoft windows
msrc
patch management
product life cycle
release notifications
security bulletin
securityresearch
stuxnet
updates
vulnerabilities
vulnerability reports
webcast
05.26.2009 - L0phtCrack 6 Released: The code and L0phtCrack name have taken a long strange trip from proof of concept code for a vulnerability in 1997 to a commercial application funding the L0pht's security research to being sold as a product by the security consulting company @stake and then...