Detecting Midnight Blizzard using Microsoft Sentinel
This blog reviews the Midnight Blizzard Attack, providing some hypothetical scenarios of what actually happened and how it could've been prevented.
This blog reviews the Midnight Blizzard Attack, providing some hypothetical scenarios of what actually happened and how it could've been prevented.
Unfortunately, attacks happen... But a post-attack investigation is paramount to stopping the next attack. In this blog, Paul Robichaux reviews what to do after an attack has taken place, with practical tips along the way.
Patching your systems manually can be complicated and require a lot of overhead. Luckily, Microsoft has a new solution to help with this. In this blog, Paul Robichaux reviews the new Windows Autopatch tool and what it has to offer.
You might be at risk for a similar attack to Microsoft's Midnight Blizzard attack. In this blog, Paul Robichaux discusses what happened and how to avoid this in your organization.
A January 19 report from the Microsoft Security Response Center (MSRC) tells of an attack by Russian state actor Midnight Blizzard against Microsoft corporate systems. The attack resulted in the exfiltration of some email and documents from email accounts owned by senior Microsoft employees.
What does your Incident Response plan look like? In this blog, Paul Robichaux reviews what to expect when building your own Incident Response Plan.
In this article, we discuss how to enhance mobile security in MAM, focusing on the Defender for Endpoint functionality and features related to mobile devices, specifically for BYOD scenarios.
In this Edition of Practical Protection, Paul Robichaux dives into Microsoft's Cybersecurity Reference Architecture and discusses if you really need it.
With the end of the year in sight, we wanted to look back and see how Microsoft performed with security products in 2023, reviewing some of Microsoft’s biggest announcements and discussing if Microsoft's focus is leaning in the right direction.
The NSA and CISA released a joint bulletin titled “Top Ten Cybersecurity Misconfigurations.” In this blog, Paul Robichaux reviews a few of the most significant suggested mitigations from this bulletin.
This edition of Practical Protection is all about theory and playing games. In this blog, Paul Robichaux explains how to improve your security posture by setting up hypothetical scenarios in your environment.
The Storm-0558 incident serves as a stark reminder of the potential threats that organizations face in today's digital landscape. In this blog, Rich Dean recaps the insider conversation around Storm-0558 that the Practical 365 Podcast team had with Alex Weinert, Microsoft's VP for Identity Security.