Skip to content

Microsoft Secure

cerber-christmas-wallpaper-5a548af0f0345

No slowdown in Cerber ransomware activity as 2016 draws to a close

The trend towards increasingly sophisticated malware behavior, highlighted by the use of exploits and other attack vectors, makes older platforms so much more susceptible to ransomware attacks. From June to November 2017, Windows 7 devices were 3.4 times more likely to encounter ransomware compared to Windows 10 devices. Read our latest report: A worthy upgrade:...

Read more

Twin zero-day attacks: PROMETHIUM and NEODYMIUM target individuals in Europe

Targeted attacks are typically carried out against individuals to obtain intellectual property and other valuable data from target organizations. These individuals are either directly in possession of the targeted information or are able to connect to networks where the information resides. Microsoft researchers have encountered twin threat activity groups that appear to target individuals for...

Read more

No payment necessary: Fighting back against ransomware

Any IT professional who’s ever had an experience with malware knows how fast an intrusive attack can happen, and how difficult it can be to educate employees to be vigilant against such threats. And with ransomware attacks only growing, having information, tools and technologies to help protect your network can mean the difference between serious...

Read more

RSA Conference USA 2014: New Foundations for Threat Modeling

What if you could deploy a process that would help you develop software products and services with better security, shorter development cycles, and fewer surprises for your customers? Those are some of the benefits of threat modeling, which was the topic of an excellent presentation: New Foundations for Threat Modeling, from Adam Shostack, principal security...

Read more

RSA Conference 2014: A look at the week ahead

RSA Conference 2014: A look at the week ahead

Greetings from RSA Conference 2014 in San Francisco. Microsoft is proud to be part of the important discussions taking place this week, and I’ll be bringing you daily video reports with highlights from the event. Our first installment takes a look at the week ahead, including the keynote address from Trustworthy Computing Corporate Vice President, Scott Charney, and...

Read more