There’s more than one way to skin an orange…

​When it comes to attacking a system, and compromising its data and/or resources, there are several different methods that an attacker can choose. One of the more effective ways to make a successful compromise is to take advantage of perceived vulnerabilities in the targeted system. A vulnerability refers to a characteristic of a system that…

0

SIRv11: Putting Vulnerability Exploitation into Context

As Vinny Gullotto, our GM blogged earlier in the week, the 11th edition of the Security Intelligence Report (SIRv11) has been released. One of the new areas of research in this release is a study of the most prevalent kinds of vulnerability exploitation and how much of that exploitation is 0-day (short for zero-day, an…

0

New: Microsoft Security Intelligence Report Volume 11- Now Available

Hi, again everyone! Today we released the 11th volume of the Microsoft Security Intelligence Report, also known as SIRv11.   I have to say once again we’ve outdone ourselves and launched the largest and most comprehensive version of this report to date. This time it’s over 800 pages of threat intelligence spanning 100+ countries and regions…

0

The Botnet Superhighway

The latest Microsoft Security Intelligence Report (SIR) dedicates a whole section to botnets and the role they play in today’s world of malware, and for good reason – the pathways of the malware world are quickly merging into a botnet superhighway, a new conduit used for many nefarious purposes. If you compare the worldwide infection…

0

Have you checked the Java?

Whilst working on our normal data pull and analysis for the Microsoft Security Intelligence Report (v9 – released last week), I embarked on a mini discovery mission on the exploit data that MMPC detects with our antimalware technology.  Although the main focus of antimalware software is on traditional malware families, antimalware technologies can do a…

0

Announcing Microsoft Security Intelligence Report version 9

Today, the 9th edition of the Microsoft Security Intelligence Report was released as Adrienne Hall, General Manager of Microsoft Trustworthy Computing Communications, gave her keynote at RSA Europe.   This time around, we’ve done a few things differently.  First off – we’ve dedicated this particular volume to the study of botnets and the role that…

0