Advertisement · 728 × 90

Posts by Matthew Kennedy

Microsoft has released new comprehensive security updates for all supported versions of SharePoint Server (Subscription Edition, 2019, and 2016) that protect customers against these new vulnerabilities. msft.it/6045sE1ux

8 months ago 2 1 1 0
Preview
Microsoft is moving antivirus providers out of the Windows kernel Microsoft wants to avoid another CrowdStrike incident.

Microsoft is moving antivirus providers out of the Windows kernel

9 months ago 37 6 2 1

Excellent work by Mandiant and crew! Great blog!

1 year ago 6 1 1 0

MSTIC is hiring in the UK and EU for entry level and senior analyst roles!

jobs.careers.microsoft.com/global/en/jo...

jobs.careers.microsoft.com/global/en/jo...

1 year ago 8 3 0 0
Preview
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine | Microsoft Security Blog Since January 2024, Microsoft has observed Secret Blizzard using the tools or infrastructure of other threat groups to attack targets in Ukraine and download its custom backdoors Tavdig and KazuarV2.

Be sure to check out part 2!

Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine

www.microsoft.com/en-us/securi...

1 year ago 13 3 0 0

jobs.careers.microsoft.com/global/en/jo...

jobs.careers.microsoft.com/global/en/jo...

1 year ago 5 1 2 0

MSTIC is hiring! Current roles in US and AU.

The Microsoft Threat Intelligence Center (MSTIC) is recruiting experienced nation-state threat hunters with highly honed threat intel analysis skills. MSTIC is responsible for delivering timely threat intelligence across our product & services teams.

1 year ago 115 35 4 5

Excellent work by the team!

Another fascinating example of Secret Blizzard using “the tools/infrastructure of at least six other threat actors during the past seven years”

1 year ago 6 2 0 0
Advertisement
Preview
North Korean hackers have stolen billions in crypto by posing as VCs, recruiters and IT workers | TechCrunch Security researchers say North Korean hackers have infiltrated hundreds of organizations with the goal of taking money and stealing data to further the regime's nuclear weapons program.

New, by me: Security researchers say North Korean hackers, posing as VCs, recruiters, and remote IT workers, have infiltrated "hundreds of organizations" and stolen billions of crypto in recent years to fund the regime's nuke program.

My dispatch from Cyberwarcon: techcrunch.com/2024/11/28/n...

1 year ago 160 69 6 14

Every holiday season I do a “security tune up” across all my accounts to ensure I’m making use of the best new security features.

What features / tech should I prioritize this year?

1 year ago 0 0 0 0

We are generally way too overconfident in understanding adversary intent.

Activity is straightforward, attribution is tricky and intent is often opaque and relies on organizational politics and bureacracy inside organizations.

1 year ago 15 1 2 1

One of my favorite aspects about @cyberwarcon.bsky.social is how it’s a yearly homecoming for a group of people with the primary focus of making a positive impact in the digital domain.

Regardless of healthy business competition, there’s a shared camaraderie being in the fight together.

1 year ago 25 2 2 0

Can’t forget to shout out these three GOATs who presented on Storm-2077 today!

1 year ago 16 2 0 0

James crushing it as always. But what’s even better is getting to work alongside of him each day. An amazing teammate and friend!

1 year ago 9 0 1 0

James Elliott absolutely crushing the last talk of the day at #CYBERWARCON.

1 year ago 14 4 0 0

Doppelgänger insight from Meta: Professional/contracted IO has two audiences: the target of the campaign and those who hired them (Kremlin)

1 year ago 5 1 0 0

Made a list of accounts at @cyberwarcon.bsky.social to make it easier to follow along: bsky.app/profile/did:...

1 year ago 9 3 1 0

As always, great insights from Josh and Pratik at Google TAG on IRGC operations. #cyberwarcon

1 year ago 9 1 0 0
Advertisement
Preview
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON | Microsoft Security Blog At CYBERWARCON 2024, Microsoft Threat Intelligence analysts will share research and insights on North Korean and Chinese threat actors representing years of threat actor tracking, infrastructure monit...

Find out more on what MSTIC plans to present at CyberWarCon today!

www.microsoft.com/en-us/securi...

1 year ago 7 0 0 0

The DPRK IT Worker apparatus is a well oiled machine. Few grasp the depth of how many pieces enable these operations.

1 year ago 14 4 0 0
Preview
Between Two Gregs: An Update on the North Korean Threat Landscape In this episode of the Microsoft Threat Intelligence Podcast host Sherrod DeGrippo is joined by Proofpoint’s Greg Lesnewich and Microsoft’s Greg Schloemer to share the unique threat posed by North Korea’s (DPRK) state-sponsored cyber activities. The Gregs discuss their years of experience tracking North Korean cyber actors and the distinct tactics that set DPRK apart from other nation-sponsored threats. The conversation also explores North Korea’s high stakes, as DPRK threat actors operate under intense pressure from government handlers, adding a layer of urgency and fear to their operations. They share insights into North Korea’s aggressive use of stolen cryptocurrency to fund the regime’s initiatives, like ballistic missile tests, and discuss the broader geopolitical impact.

My two favorite Gregs talking my favorite topic. Check it out!

thecyberwire.com/podcasts/mic...

1 year ago 3 2 0 0
Preview
Volt Typhoon: What State and Local Government Officials Need to Know Increased activity from the state-sponsored threat group Volt Typhoon raises concerns about the cybersecurity of U.S. critical infrastructure. Here’s how you can identify potential exposures and attac...

There's been a lot of attention on the Salt Typhoon intrusions. Don't forget the Volt Typhoon prepositioning is still a major problem as well!

www.tenable.com/blog/volt-ty...

1 year ago 26 8 0 1

Excited to support my teammates as they share fascinating insights into threat actors from North Korea and China. Don’t miss these!

1 year ago 9 0 0 0

It’s CYBERWARCON week!!!

CTI homecoming is here!

1 year ago 10 1 0 0
Post image

We have liberated this image from the oppressors @cyberwarcon.bsky.social

1 year ago 16 5 0 0
Advertisement

One of the most fascinating aspects of following DPRK threat actors is observing leading indicators from numerous intrusion sets target the same technology months before an announcement.

1 year ago 2 0 0 0
Preview
Senior Security Researcher in Redmond, Washington, United States | Security Engineering at Microsoft Apply for Senior Security Researcher in Redmond, Washington, United States | Security Engineering at Microsoft

MSTIC is hiring! Come join our team focused on tracking and disrupting threats to Microsoft and our customers!

jobs.careers.microsoft.com/global/en/sh...

1 year ago 0 1 0 0