Skip to main content
Microsoft Security

Microsoft Security Blog

Layout of education-related items on a desk and a representation of cyberthreat vectors, next to the title text “Cyber Signals Issue 8, From Classrooms to Research Labs: Cyberthreats in K-12 and Higher Education, by Cyber Signals, A Microsoft Threat Intelligence Report.”
Published
12 min read

​​Cyber Signals Issue 8 | Education under siege: How cybercriminals target our schools​​ 

​This edition of Cyber Signals delves into the cybersecurity challenges facing classrooms and campuses, highlighting the critical need for robust defenses and proactive measures. From personal devices to virtual classes and research stored in the cloud, the digital footprint of school districts, colleges, and universities has multiplied exponentially.​

Latest posts
Decorative image of a pixelated ball in pink and orange with Microsoft logo in the top left corner and text banner in the bottom left corner
Published
5 min read

Escalating cyber threats demand stronger global defense and cooperation 

We must find a way to stem the tide of this malicious cyber activity. That includes continuing to harden our digital domains to protect our networks, data, and people at all levels. However, this challenge will not be accomplished solely by executing a checklist of cyber hygiene measures but only through a focus on and commitment to the foundations of cyber defense from the individual user to the corporate executive and to government leaders.  

Two engineers wearing safety goggles work on a desktop PC at a manufacturing plant.

Storm-0501: Ransomware attacks expanding to hybrid cloud environments 

Microsoft has observed the threat actor tracked as Storm-0501 launching a multi-staged attack where they compromised hybrid cloud environments and performed lateral movement from on-premises to cloud environment, leading to data exfiltration, credential theft, tampering, persistent backdoor access, and ransomware deployment. The said attack targeted multiple sectors in the United States, including government, manufacturing, transportation, […]

Retain Microsoft Security Experts

Microsoft Security Experts are now available to strengthen your team with managed security services. Learn how to defend against threats with security experts.

North Korean threat actor Citrine Sleet exploiting Chromium zero-day 

Microsoft identified a North Korean threat actor exploiting a zero-day vulnerability in Chromium (CVE-2024-7971) to gain remote code execution (RCE) in the Chromium renderer process. Our assessment of ongoing analysis and observed infrastructure attributes this activity to Citrine Sleet, a North Korean threat actor that commonly targets the cryptocurrency sector for financial gain.