Hello open source security! Managing risk with software composition analysis
Software composition analysis guides the selection and management of open source components to help you reduce your security risk.
Software composition analysis guides the selection and management of open source components to help you reduce your security risk.
Security incidents don’t happen exclusively during business hours: attackers often wait until the late hours of the night to breach an environment.
This blog wraps up the day in the life of a SOC analyst on the investigation team with insights on remediating incidents, post-incident cleanup, and impact of COVID-19 on the SOC. This is the sixth blog post in the series.
By working with governments, trade organizations, and suppliers, the utility industry can improve security across the supply chain.
During the MITRE ATT&CK evaluation, Microsoft Threat Protection delivered on providing the deepest optics, near real time detection, and a complete view of the attack story.
Our threat intelligence shows that COVID-19 themed threats are retreads of existing attacks that have been slightly altered to tie to the pandemic. We’re seeing a changing of lures, not a surge in attacks. These attacks are settling into the normal ebb and flow of the threat environment.
Web shell attacks allow adversaries to run commands and steal data from an Internet-facing server or use the server as launch pad for further attacks against the affected organization.
In this next post in our series, we provide insight into a day in the life of our SOC analysts investigating common front door attacks.
Aluminum supplier Norsk Hydro was attacked by LockerGoga, a form of ransomware. Learn how the company recovered and got back to business as usual.
As part of Microsoft’s Detection and Response Team (DART) Incident Response engagements, we regularly get asked by customers about “paying the ransom” following a ransomware attack.