A guide to combatting human-operated ransomware: Part 1
Microsoft Security Blog

A guide to combatting human-operated ransomware: Part 1

This blog is part one of a two-part series focused on how Microsoft DART helps customers with human-operated ransomware. For more guidance on human-operated ransomware and how to defend against these extortion-based attacks, refer to our human-operated ransomware docs page. Microsoft’s Detection and Response Team (DART) has helped customers of all sizes, across many industries…

Further, faster, together: Microsoft donates $100 million to Breakthrough Energy Catalyst to accelerate and scale climate tech
Microsoft Blog

Further, faster, together: Microsoft donates $100 million to Breakthrough Energy Catalyst to accelerate and scale climate tech

When Microsoft pledged to be carbon negative by 2030, we recognized that the path to get there involved the advancement of key climate technologies to enable us to both reduce and remove carbon. That is why we backed our carbon negative commitment with two financial vehicles that will help us reach our goals — a…

Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability
Microsoft Security Blog

Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability

In August, Microsoft Threat Intelligence Center (MSTIC) identified a small number of attacks (less than 10) that attempted to exploit a remote code execution vulnerability in MSHTML using specially crafted Microsoft Office documents. These attacks used the vulnerability, tracked as CVE-2021-40444, as part of an initial access campaign that distributed custom Cobalt Strike Beacon loaders….

Afternoon Cyber Tea: Learn how to stop misinformation threats from nation-state bad actors
Microsoft Security Blog

Afternoon Cyber Tea: Learn how to stop misinformation threats from nation-state bad actors

Information has long been wielded as an instrument of national power and influence. In today’s digital world, misinformation can also be just as powerful. On a special episode of Afternoon Cyber Tea with Ann Johnson, Sandra Joyce, Executive Vice President and Head of Mandiant Intelligence at FireEye joined me to talk about threat attribution and…

Optimizing end-user experience for VMware Horizon Cloud on Microsoft Azure with ControlUp
Horizon | Horizon Cloud | Microsoft | VMWare Blog | VMware Horizon

Optimizing end-user experience for VMware Horizon Cloud on Microsoft Azure with ControlUp

This article was co-written by Sachin Sharma, Director of Product Marketing, VMware, and Tom Fenton, Technical Marketing Manager, ControlUp. By now you (hopefully!) know how using ControlUp with VMware Horizon can help you optimize your end-users’ experience through real-time observations, deep analytics and reducing MTTR. Through tight integrations with the VMware software-defined datacenter (SDDC) stack,…

Microsoft and LinkedIn share latest data and innovation for hybrid work
Microsoft Blog

Microsoft and LinkedIn share latest data and innovation for hybrid work

This morning Satya Nadella and Ryan Roslansky, the CEO of LinkedIn, sat down to talk about the key secular trends they’re seeing as people and organizations everywhere adjust to hybrid work. Their conversation is part of an effort between Microsoft and LinkedIn to help leaders and their teams navigate this new world of work, and here I’ll share more about the trends we’re seeing, the data behind them and the product updates we’re announcing today across Microsoft Teams, Microsoft Viva and…