The five-day job: A BlackByte ransomware intrusion case study

In a recent investigation by Microsoft Incident Response of a BlackByte 2.0 ransomware attack, we found that the threat actor progressed through the full attack chain, from initial access to impact, in less than five days, causing significant business disruption for the victim organization.

The post The five-day job: A BlackByte ransomware intrusion case study appeared first on Microsoft Security Blog.

Continue reading The five-day job: A BlackByte ransomware intrusion case study

Grant users access to data assets in your enterprise through the Microsoft Purview policies API

Microsoft Purview Data owner policies is a cloud-based service that helps you provision access to data sources and datasets securely and at scale. Data owner policies expose a REST API through which you can grant any Azure AD identity (user, group or s… Continue reading Grant users access to data assets in your enterprise through the Microsoft Purview policies API

Fighting notification spam in Microsoft Edge

Web site notifications are great for staying up to date on your favorite webapps, but they can also be used to spam you with messages that can be unwanted or even misleading. We’ve made changes to help customers avoid these spammy messages and incr

The post Fighting notification spam in Microsoft Edge appeared first on Microsoft Edge Blog.

Continue reading Fighting notification spam in Microsoft Edge

Microsoft Defender for Endpoint is ranked number one in market share in the IDC Worldwide Corporate Endpoint Security Market Shares report, 2022

Today, we are proud to share that Microsoft is ranked number one in market share in the IDC Worldwide Corporate Endpoint Security Market Shares report, 2022. More customers choose and trust Microsoft Defender for Endpoint and Microsoft Defender for Business to defend their multiplatform devices than any other vendor.

The post Microsoft Defender for Endpoint is ranked number one in market share in the IDC Worldwide Corporate Endpoint Security Market Shares report, 2022 appeared first on Microsoft Security Blog.

Continue reading Microsoft Defender for Endpoint is ranked number one in market share in the IDC Worldwide Corporate Endpoint Security Market Shares report, 2022

Deceptive defense: best practices for identity based honeytokens in Microsoft Defender for Identity

Honeytokens are a great tool for defenders to augment their security posture with traps hidden within their digital environments. Similar to honeypots, Honeytokens are decoy accounts set up purely to lure attackers and divert their attention away … Continue reading Deceptive defense: best practices for identity based honeytokens in Microsoft Defender for Identity