RT @Recon_InfoSec@twitter.com
What an awesome opportunity to hear from @Cyb3rWard0g@twitter.com of #MSTIC & @OTR_Community@twitter.com on today's #ThursdayDefensive on some of the ways Microsoft approaches adversary behavior classification and the supporting data sources.
Join us next week! https://reconis.co/3XKQtOq
π¦π: https://twitter.com/Recon_InfoSec/status/1616151955604111389
What an awesome opportunity to hear from @Cyb3rWard0g of #MSTIC on today's #ThursdayDefensive on some of the ways Microsoft approaches adversary behavior classification and the supporting data sources.
Join us next week! https://www.reconinfosec.com/thursday-defensive/
Zerobot is a Go-based botnet that spreads primarily through IoT and web application vulnerabilities.
Learn how Zerobot works and how to defend devices and networks against it:
- Use Microsoft 365 Defender as security solutions with cross-domain visibility and detection capabilities
- Adopt a comprehensive IoT security solution such as Microsoft Defender for IoT, integrate it with XDR platform such as Microsoft Sentinel and Microsoft 365 Defender
- Harden endpoints with a comprehensive Windows security solution
- Ensure secure configurations for devices
- Use least privileges access
#microsoft #windows #security #iot #MSTIC #azure #xdr #microsoft365defender #defenderforIoT #iot #sentinel #microsoftsentinel #siem #soar #cloud #cloudsecurity #Zerobot #ssh #leastprivilege #rat #ioc #threatintelligence #ti #tip #ddos #ZeroStresser #webapp #vulnerabilities #cve
#microsoft #windows #security #iot #MSTIC #azure #xdr #microsoft365defender #defenderforiot #sentinel #MicrosoftSentinel #siem #soar #cloud #cloudsecurity #zerobot #ssh #LeastPrivilege #rat #ioc #threatintelligence #ti #tip #ddos #zerostresser #webapp #vulnerabilities #cve
Zerobot is a Go-based botnet that spreads primarily through IoT and web application vulnerabilities.
Learn how Zerobot works and how to defend devices and networks against it:
- Use Microsoft 365 Defender as security solutions with cross-domain visibility and detection capabilities
- Adopt a comprehensive IoT security solution such as Microsoft Defender for IoT, integrate it with XDR platform such as Microsoft Sentinel and Microsoft 365 Defender
- Harden endpoints with a comprehensive Windows security solution
- Ensure secure configurations for devices
- Use least privileges access
#microsoft #windows #security #iot #MSTIC #azure #xdr #microsoft365defender #defenderforIoT #iot #sentinel #microsoftsentinel #siem #soar #cloud #cloudsecurity #Zerobot #ssh #leastprivilege #rat #ioc #threatintelligence #ti #tip #ddos #ZeroStresser #webapp #vulnerabilities #cve
#microsoft #windows #security #iot #MSTIC #azure #xdr #microsoft365defender #defenderforiot #sentinel #MicrosoftSentinel #siem #soar #cloud #cloudsecurity #zerobot #ssh #LeastPrivilege #rat #ioc #threatintelligence #ti #tip #ddos #zerostresser #webapp #vulnerabilities #cve
DEV-0139 launches targeted attacks against the cryptocurrency industry https://www.microsoft.com/en-us/security/blog/2022/12/06/dev-0139-launches-targeted-attacks-against-the-cryptocurrency-industry/
Please, continue π #MSTIC
#MSTIC updates out today regarding DEV-0569 / Royal #ransomware
+ DEV-0569 likely to continue malvertising and phishing for Initial Access
+ #Batloader posed as installers for TeamViewer, Zoom, and AnyDesk
+ Malvertising campaign observed leveraging Google Ads to deliver Batloader selectively
#threatintel #infosec
#MSTIC #ransomware #batloader #threatintel #infosec
Social Engineering: Liam Tung reports hackers are using fake job offers and #OpenSource software to target IT staff https://www.fosslife.org/hackers-use-fake-job-offers-and-open-source-software-target-it-staff #ZINC #hacker #FOSS #MSTIC #PuTTY #KiTTY #TightVNC #phishing #WhatsApp
#whatsapp #phishing #TightVNC #KiTTY #PuTTY #MSTIC #foss #hacker #ZINC #opensource
π¬ DEV-0270: BitLocker als Werkzeug einer Ransomwaregruppe
#Hacking #Malware #Bitlocker #DiskCryptor #LOLBIN #MSTIC #NemesisKitten #Phosphorus #Ransomwaregruppe https://tarnkappe.info/artikel/malware/dev-0270-bitlocker-als-werkzeug-einer-ransomwaregruppe-255437.html
#Ransomwaregruppe #phosphorus #NemesisKitten #MSTIC #lolbin #DiskCryptor #bitlocker #malware #hacking
π¬ DSIRF: Microsoft warnt vor Softwarefirma β Staatsschutz ermittelt
#Hacking #DSIRF #Malware #Microsoft #MSTIC #Staatsschutz #Subzero #ZeroDaySchwachstellen https://tarnkappe.info/artikel/hacking/dsirf-microsoft-warnt-vor-softwarefirma-staatsschutz-ermittelt-253275.html
#ZeroDaySchwachstellen #subzero #staatsschutz #MSTIC #microsoft #malware #DSIRF #hacking
Inside the Microsoft team tracking the worldβs most dangerous hackers https://www.technologyreview.com/s/614646/inside-the-microsoft-team-tracking-the-worlds-most-dangerous-hackers/ #MSTIC #Threat #Intelligence #Microsoft
#MSTIC #threat #intelligence #microsoft