Threat Intelligence

Cyber Signals: Inside the growing risk of gift card fraud

In the ever-evolving landscape of cyberthreats, staying ahead of malicious actors is a constant challenge. Microsoft Threat Intelligence has observed that gift cards are attractive targets for fraud and social engineering practices. Unlike credit or debit cards, there’s no customer name or bank account attached to them, which can lessen scrutiny of their potentially suspicious […]

Cyber Signals: Inside the growing risk of gift card fraud Continue Reading

You Are Real: More Secure Identity Verification

Why is Liveness Detection Crucial for Identity Verification Today? With the ubiquitous internet infrastructure and mobile networks providing a backbone for daily interactions, coupled with a sustained increase in remote activities post-pandemic, the need for robust identity verification mechanisms is more critical than ever. As individuals engage in a wide range of online transactions —

You Are Real: More Secure Identity Verification Continue Reading

Accelerate cloud security risk remediation with Microsoft Copilot for Security

As cloud environments experience rapid expansion, evolution, and increasing complexity, security teams face a significant and growing challenge in identifying, assessing, and remediating cloud security risks across multicloud environments and developer pipelines. With Copilot in Defender for Cloud, security teams can efficiently identify critical risks across their multicloud environments and developer pipelines and streamline remediation

Accelerate cloud security risk remediation with Microsoft Copilot for Security Continue Reading

New Windows 11 features strengthen security to address evolving cyberthreat landscape

Ahead of the Microsoft Build 2024 conference, we announced a new class of Windows computers, Copilot+ PC. Alongside this exciting new class of PCs, we are introducing important security features and updates that make Windows 11 more secure for users and organizations and give developers the tools to prioritize security. Today’s threat landscape is unlike

New Windows 11 features strengthen security to address evolving cyberthreat landscape Continue Reading

Threat actors misusing Quick Assist in social engineering attacks leading to ransomware

Since mid-April 2024, Microsoft Threat Intelligence has observed the threat actor Storm-1811 misusing the client management tool Quick Assist to target users in social engineering attacks. Storm-1811 is a financially motivated cybercriminal group known to deploy Black Basta ransomware. The observed activity begins with impersonation through voice phishing (vishing), followed by delivery of malicious tools,

Threat actors misusing Quick Assist in social engineering attacks leading to ransomware Continue Reading

Securing your API Management service from day one with Defender for APIs

Introduction We are excited to announce that you can now secure your Azure API Management (APIM) managed APIs from day one with Defender for APIs. This allows you to enable security as soon as you create your APIM service within the Azure portal. This means that security for APIs is no longer an afterthought and

Securing your API Management service from day one with Defender for APIs Continue Reading

The LLM Latency Guidebook: Optimizing Response Times for GenAI Applications

Co-authors: Priya Kedia, Julian Lee, Manoranjan Rajguru, Shikha Agrawal, Michael Tremeer Contributors: Ranjani Mani, Sumit Pokhariyal, Sydnee Mayers Generative AI applications are transforming how we do business today, creating new, engaging ways for customers to engage with applications. However, these new LLM models require massive amounts of compute to run, and unoptimized applications can run

The LLM Latency Guidebook: Optimizing Response Times for GenAI Applications Continue Reading

How implementing a trust fabric strengthens identity and network

The identity security landscape is transforming rapidly. Every digital experience and interaction is an opportunity for people to connect, share, and collaborate. But first, we need to know we can trust those digital experiences and interactions. Customers note a massive rise in the sheer number of identities they need to enable, connect, and protect. These

How implementing a trust fabric strengthens identity and network Continue Reading

Vulnerability Assessment with Defender for Servers, Powered by Defender Vulnerability Management

 Microsoft Defender for Cloud is a comprehensive multicloud application protection platform (CNAPP) meticulously designed to safeguard your cloud-based applications from every angle, covering the entire journey from code to cloud. A pivotal aspect of cloud security involves the continuous monitoring and management of emerging vulnerabilities across your cloud workloads. By implementing strong vulnerability management practices,

Vulnerability Assessment with Defender for Servers, Powered by Defender Vulnerability Management Continue Reading

Microsoft Sentinel: Delivering value to your SOC

In today’s dynamic landscape, threats are rapidly evolving, and digital transformation is the norm. Balancing security and business outcomes are significant challenges for security teams seeking robust solutions to safeguard their expanding attack surface while effectively managing their data strategy and costs. Microsoft Sentinel is our next-generation cloud native security information and event management (SIEM)

Microsoft Sentinel: Delivering value to your SOC Continue Reading