Select Page
Bar chart illustrating the distribution of cryware family detections from January to December 2021.

In hot pursuit of ‘cryware’: Defending hot wallets from attacks

The steep rise in cryptocurrency market capitalization, not surprisingly, mirrors a marked increase in threats and attacks that target or leverage cryptocurrencies. But Microsoft researchers are observing an even more interesting trend: the evolution of related malware and their techniques, ... continue reading
Diagram showing the relationship between players in the ransomware-as-a-service affiliate model. Access brokers compromise networks and persist on systems. The RaaS operator develops and maintain tools. The RaaS affiliate performs the attack.

Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself

Microsoft processes 24 trillion signals every 24 hours, and we have blocked billions of attacks in the last year alone. Microsoft Security tracks more than 35 unique ransomware families and 250 unique threat actors across observed nation-state, ransomware, and criminal ... continue reading
parobinson_0-1651699902170.png

Passwordless RDP with Windows Hello for Business

Windows Hello for Business (WHfB) provides a password-less experience for users to log into their Windows 10 or 11 device. However, a challenge remains when accessing remote systems. This can be via MMC console for example to access Active Directory ... continue reading
New capabilities that empower you to migrate more of your apps on AD FS to Azure AD

New capabilities that empower you to migrate more of your apps on AD FS to Azure AD

Howdy folks! My name is Samuel Devasahayam and I’m a Group Product Manager at Microsoft, focused on our Authentication platform. Over the past few years, we’ve seen thousands of customers migrate millions of apps and users from Active Directory Federation ... continue reading
Deep dive: How does Conditional Access block Legacy Authentication?

Deep dive: How does Conditional Access block Legacy Authentication?

Azure Active Directory's Conditional Access feature is great for reducing risk during sign-in attempts, by analyzing the user and sign-in conditions and applying appropriate policy controls. These can include prompting for multi-factor authentication or blocking the sign-in attempt. Unfortunately, some ... continue reading

F5 builds value with easy identity management via Conditional Access

Sue Bohn, Vice President of Program Management, Identity and Network Access Division, Microsoft Jay Kelley, Senior Manager of BIG-IP Security Product Marketing, F5 Erin Verna, Principal Product Marketing Manager, F5 Namita Singh, Senior Product Manager, F5 Hello! I’m Sue Bohn, ... continue reading
Salesforce now enforcing multi-factor authentication—Azure AD has you covered

Salesforce now enforcing multi-factor authentication—Azure AD has you covered

With Salesforce’s recent requirement of enabling multi-factor authentication (MFA) to access Salesforce products, we wanted to share how Azure Active Directory can support you on this journey. With organizations supporting hybrid work and employees using a variety of applications to ... continue reading
Partial screenshot of a messaging application showing a text message from LAPSUS$ with the following heading:  We recruit employees/insider at the following!!!!

DEV-0537 criminal actor targeting organizations for data exfiltration and destruction

In recent weeks, Microsoft Security teams have been actively tracking a large-scale social engineering and extortion campaign against multiple organizations with some seeing evidence of destructive elements. As this campaign has accelerated, our teams have been focused on detection, customer ... continue reading
Reducing Extra Prompts with the Authentication Prompt Analysis Workbook

Reducing Extra Prompts with the Authentication Prompt Analysis Workbook

We’re excited to share with you our latest Azure AD workbook, Authentication Prompt Analysis! You can find all our previous workbooks at Azure Monitor workbooks for reports.  If you haven’t setup your logs to use log analytics yet, you can ... continue reading
Azure AD: Change Management Simplified

Azure AD: Change Management Simplified

Hello Everyone, Rapid change is a growing reality in cloud services. In Azure AD alone, we are making hundreds of changes every year including new feature releases, changes to existing features, as well as deprecations and retirements. We’ve heard from ... continue reading