7 Precautions for Protecting Against Perpetrators

Cyberattacks and data breaches continue to dominate the news globally. The reality is that most organizations face the same often reported threats and are carrying on their work towards counteracting those risks. Some organizations victimized by cybercriminals have shared information publicly. Others have chosen to conduct investigations and share information about the attack in a more limited way, or not at all. As a result, media themes related to cyberattacks … Read more »

You asked, we answered: #AskPtH Questions and Answers

Untitled

Pass-the-Hash (PtH) refers to a technique that allows an attacker to capture account logon credentials on one compromised computer, and then use those captured credentials to authenticate to other computers across the network. Many of our customers, including administrators who want to protect their networks are particularly interested in this technique. So, we wanted to open the conversation to our @msftsecurity Twitter followers, and hear what questions you had about … Read more »

Enterprise Threat Encounters: Scenarios and Recommendations – Part 1

Many of the IT Professionals that contact our customer service and support group have common questions related to security incidents and are seeking guidance on how to mitigate threats from determined adversaries.  Given the level of interest in this information and common scenarios that exist amongst different organizations, we are publishing a multi-part series which will detail common security incidents organizations face and provide recommended mitigations based on guidance from … Read more »

New Guidance to Mitigate Determined Adversaries’ Favorite Attack: Pass-the-Hash

Author:  Matt Thomlinson, General Manager, Trustworthy Computing Targeted attacks by determined adversaries (also known as Advanced Persistent Threats or APTs) have been a hot topic recently.  Although targeted attacks continue to make up a small fraction of the attacks we see today, reports of attacks targeting organizations and governments have attracted a lot of attention. We know that one of the first things determined adversaries do if they are able … Read more »