Catching the big fish: Analyzing a large-scale phishing-as-a-service operation

With over 100 available phishing templates that mimic known brands and services, the BulletProofLink operation is responsible for many of the phishing campaigns that impact enterprises today. We are sharing these findings so the broader community can build on them and use them to enhance email filtering rules as well as threat detection technologies like sandboxes to better catch these threats.

The post Catching the big fish: Analyzing a large-scale phishing-as-a-service operation appeared first on Microsoft Security Blog.

Continue reading Catching the big fish: Analyzing a large-scale phishing-as-a-service operation

IMPORTANT: All Partners must reassociate their signing certificates!

We recently made some changes to Partner Center for Windows Hardware. As a result of these changes, all participants in the hardware program are required to reassociate their valid signing certificates used when making submissions to Partner Center for… Continue reading IMPORTANT: All Partners must reassociate their signing certificates!

Block/allow specific IP addresses from accessing applications running on Azure Cloud Services

For certain scenario, the application / website hosted in Azure Cloud Services needs more secure without anonymous access, this blog will introduce below four ways to specify IP address (or a range of IP addresses) could be blocked / allowed from acces… Continue reading Block/allow specific IP addresses from accessing applications running on Azure Cloud Services