Skip to content
Microsoft Secure

No slowdown in Cerber ransomware activity as 2016 draws to a close

The trend towards increasingly sophisticated malware behavior, highlighted by the use of exploits and other attack vectors, makes older platforms so much more susceptible to ransomware attacks. From June to November 2017, Windows 7 devices were 3.4 times more likely to encounter ransomware compared to Windows 10 devices. Read our latest report: A worthy upgrade:...

Read more

Twin zero-day attacks: PROMETHIUM and NEODYMIUM target individuals in Europe

Targeted attacks are typically carried out against individuals to obtain intellectual property and other valuable data from target organizations. These individuals are either directly in possession of the targeted information or are able to connect to networks where the information resides. Microsoft researchers have encountered twin threat activity groups that appear to target individuals for...

Read more

No payment necessary: Fighting back against ransomware

Any IT professional who’s ever had an experience with malware knows how fast an intrusive attack can happen, and how difficult it can be to educate employees to be vigilant against such threats. And with ransomware attacks only growing, having information, tools and technologies to help protect your network can mean the difference between serious...

Read more

Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain

What does the future look like?  To take a closer look, Microsoft has released a report called “Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain.”  How will the choices organizations make at present, affect their ability to shape the social, economic and demographic changes a decade from now?  See more >>...

Read more

Creating an intelligent “sandbox” for coordinated malware eradication

Antimalware companies have for some time used machine learning and big data analysis to detect and disrupt malware. But to move from disruption to eradication, the antimalware ecosystem must work with new types of partners in different ways.  Read more >>...

Read more

RSA Conference USA 2014: New Foundations for Threat Modeling

What if you could deploy a process that would help you develop software products and services with better security, shorter development cycles, and fewer surprises for your customers? Those are some of the benefits of threat modeling, which was the topic of an excellent presentation: New Foundations for Threat Modeling, from Adam Shostack, principal security...

Read more

RSA Conference 2014: Reflections from the Microsoft team

One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception. Microsoft’s security and privacy leaders were busy, not just with their own presentations, but also in discussions with other thought leaders, industry professionals and customers from around the world.  See more...

Read more

RSA Conference 2014: Microsoft’s Trust Principles

The keynote sessions at the RSA Conference are always compelling. This year’s presentations at the Moscone Center in San Francisco have been some of the best I’ve seen, with a strong focus on government surveillance programs and what they mean for the IT industry. In his keynote speech, Trustworthy Computing Corporate Vice President, Scott Charney,...

Read more

RSA Conference 2014: A look at the week ahead

Greetings from RSA Conference 2014 in San Francisco. Microsoft is proud to be part of the important discussions taking place this week, and I’ll be bringing you daily video reports with highlights from the event. Our first installment takes a look at the week ahead, including the keynote address from Trustworthy Computing Corporate Vice President, Scott Charney, and...

Read more