• Latest
  • Trending
  • All
  • News
  • Business
  • Politics
  • Science
  • World
  • Lifestyle
  • Tech
How to use Microsoft Sysmon, Azure Sentinel to log security events

The Hack Roundup: Biden Orders Intel Assessment of Suspected Russian Malfeasance

January 26, 2021
How to use Microsoft Sysmon, Azure Sentinel to log security events

Microsoft Cloud Announces Three New Vertical Cloud Solutions

February 26, 2021
Innovative solutions for IT workers at home

Privacera Announces Partnership with Talend for Rapid Cloud Data Integration and Governance with Automated Privacy and Compliance

February 26, 2021
Innovative solutions for IT workers at home

What is database encryption?

February 26, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

Microsoft Releases Azure Firewall Premium in Public Preview

February 26, 2021
Telecom Provider Migrates Confidently to Microsoft Azure with Fortinet’s Dynamic Cloud Security Solutions

Veeam Backup & Replication 11: Enhanced data management for a multi-cloud environment

February 25, 2021
8×8 makes raft of updates to platform

Advancing the Orchestration of Distributed Edge Applications, ZEDEDA Integrates with Microsoft Azure IoT

February 25, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

Cloud Security in Banking Market to Witness Huge Growth by 2026 | Microsoft Azure, Trend Micro, Salesforce

February 25, 2021
Innovative solutions for IT workers at home

ZEDEDA Announces Integration with Microsoft Azure IoT to Seamlessly and Securely Orchestrate Distributed Edge Computing Workloads at Scale

February 24, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

ZEDEDA integrates with Microsoft Azure IoT to provide full lifecycle management capabilities

February 24, 2021
Innovative solutions for IT workers at home

SolarWinds Attack: Proof That On-Premises Active Directory Still an Effective Initial Access Vector

February 23, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

Microsoft Affirms Solorigate Attackers Saw Azure, Intune and Exchange Source Code

February 23, 2021
How to use Microsoft Sysmon, Azure Sentinel to log security events

OPS101 – Securing your Hybrid environment – Part 1 – Azure Security Center

February 22, 2021
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Friday, February 26, 2021
  • Login
Azure Security News
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • News
    • All
    • Business
    • Politics
    • Science
    • World
    How to use Microsoft Sysmon, Azure Sentinel to log security events

    Microsoft Cloud Announces Three New Vertical Cloud Solutions

    Innovative solutions for IT workers at home

    Privacera Announces Partnership with Talend for Rapid Cloud Data Integration and Governance with Automated Privacy and Compliance

    Innovative solutions for IT workers at home

    What is database encryption?

    A moment of reckoning: the need for a strong and global cybersecurity response

    Cloud Security in Banking Market to Witness Huge Growth by 2026 | Microsoft Azure, Trend Micro, Salesforce

    Innovative solutions for IT workers at home

    ZEDEDA Announces Integration with Microsoft Azure IoT to Seamlessly and Securely Orchestrate Distributed Edge Computing Workloads at Scale

    A moment of reckoning: the need for a strong and global cybersecurity response

    ZEDEDA integrates with Microsoft Azure IoT to provide full lifecycle management capabilities

    Innovative solutions for IT workers at home

    SolarWinds Attack: Proof That On-Premises Active Directory Still an Effective Initial Access Vector

    A moment of reckoning: the need for a strong and global cybersecurity response

    Microsoft Affirms Solorigate Attackers Saw Azure, Intune and Exchange Source Code

    8×8 makes raft of updates to platform

    Indonesian Mobile Operator Selects NTT for Microsoft Security Project

    Microsoft To Build New Azure Cloud Data Centers In Greece

    NTT completes Microsoft security project for Indonesian mobile operator

    Trending Tags

    • Donald Trump
    • Future of News
    • Climate Change
    • Market Stories
    • Election Results
    • Flat Earth
  • Tech
    • All
    • Apps
    • Gear
    • Mobile
    • Startup
    A moment of reckoning: the need for a strong and global cybersecurity response

    Microsoft Releases Azure Firewall Premium in Public Preview

    Telecom Provider Migrates Confidently to Microsoft Azure with Fortinet’s Dynamic Cloud Security Solutions

    Veeam Backup & Replication 11: Enhanced data management for a multi-cloud environment

    8×8 makes raft of updates to platform

    Advancing the Orchestration of Distributed Edge Applications, ZEDEDA Integrates with Microsoft Azure IoT

    How to use Microsoft Sysmon, Azure Sentinel to log security events

    OPS101 – Securing your Hybrid environment – Part 1 – Azure Security Center

    A moment of reckoning: the need for a strong and global cybersecurity response

    Microsoft Ending Azure Information Protection Connections to Microsoft Defender for Endpoint

    Microsoft To Open Azure Cloud Data Center Region In Spain

    EMC Corporation Townsend security Hewlett-Packard Enterprise Gemalto N.V. Microsoft Azure Google Thales e-security International Business Machines (IBM) Broadcom

    A moment of reckoning: the need for a strong and global cybersecurity response

    Azure Engineer at VillageMD

    Innovative solutions for IT workers at home

    How to Sync On-Premise Active Directory Passwords with Office 365 and Google Apps in Real-Time

    Microsoft Azure Forms Collaboration to Enhance AI in Healthcare

    Azure Defender is now available for all IoT and OT devices

    Telecom Provider Migrates Confidently to Microsoft Azure with Fortinet’s Dynamic Cloud Security Solutions

    Google and Microsoft ID Group Targeting Security Researchers

    Trending Tags

    • Flat Earth
    • Sillicon Valley
    • Mr. Robot
    • MotoGP 2017
    • Golden Globes
    • Future of News
  • Entertainment
    • All
    • Gaming
    • Movie
    • Music
    • Sports
    Microsoft Flight Simulator Continues to Look Stunning in New Snow Video

    Microsoft Flight Simulator Continues to Look Stunning in New Snow Video

    Meet the woman who’s making consumer boycotts great again

    New campaign wants you to raise funds for abuse victims by ditching the razor

    Twitter tweaks video again, adding view counts for some users

    A beginner’s guide to the legendary Tim Tam biscuit, now available in America

    People are handing out badges at Tube stations to tackle loneliness

    Trump’s H-1B Visa Bill spooks India’s IT companies

    Magical fish basically has the power to conjure its own Patronus

    This Filipino guy channels his inner Miss Universe by strutting in six-inch heels and speedos

    Oil spill off India’s southern coast leaves fisherman stranded, marine life impacted

  • Lifestyle
    • All
    • Fashion
    • Food
    • Health
    • Travel
    Microsoft Seriously Beefs Up Security in Windows Server 2019

    Microsoft Offers More ‘Solorigate’ Advice Using Microsoft 365 Defender Tools

    A moment of reckoning: the need for a strong and global cybersecurity response

    Solar Winds, Office 365 & Shipbuilding…

    Aruba ClearPass Policy Manager Integrates with Microsoft

    Imprivata Expands Collaboration with Microsoft on New Digital Identity Innovations

    Microsoft Seriously Beefs Up Security in Windows Server 2019

    Microsoft Canada’s 10 biggest stories of 2020

    FAA issues new proposed Boeing 737 MAX pilot training procedures

    FAA issues new proposed Boeing 737 MAX pilot training procedures

    AMD breaks revenue records for 2019 and 4Q

    AMD breaks revenue records for 2019 and 4Q

    Microsoft and Analog Devices pair on 3D imaging tech

    Microsoft and Analog Devices pair on 3D imaging tech

    Microsoft is killing off insecure Cloud App Security cipher suites

    Microsoft is killing off insecure Cloud App Security cipher suites

    Rap group call out publication for using their image in place of ‘gang’

    Meet the woman who’s making consumer boycotts great again

    Trending Tags

    • Golden Globes
    • Mr. Robot
    • MotoGP 2017
    • Climate Change
    • Flat Earth
No Result
View All Result
Azure Security News
No Result
View All Result
Home Tech Mobile

The Hack Roundup: Biden Orders Intel Assessment of Suspected Russian Malfeasance

by AZURE SECURITY NEWS EDITOR
January 26, 2021
in Mobile
0
How to use Microsoft Sysmon, Azure Sentinel to log security events
491
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter

President Joe Biden has directed the intelligence community to evaluate the widespread intrusion into federal agencies and U.S. tech companies connected to IT management company SolarWinds as part of a larger look into reports of Russian misdeeds.  

White House Press Secretary Jen Psaki fielded questions about how the administration intends to respond to the hacking campaign, which key agency leaders have said is of “likely Russian” origin, in her first two press briefings.

“We reserve the right to respond at a time and in a manner of our choosing to any cyberattack,” Psaki said Wednesday. On Thursday, she added the president “is issuing a tasking to the intelligence community for its full assessment of the SolarWinds cyber breach, Russian interference in the 2020 election, its use of chemical weapons against opposition leader Alexei Nevalny and the alleged bounties on U.S. soldiers in Afghanistan.”

The U.S. also seeks to extend a nuclear arms reduction agreement—New START—it entered with Russian in 2010, Psaki said, noting this was especially important given the Kremlin’s current adversarial posture.

“Even as we work with Russia to advance US interests so too we work to hold Russia to account for its reckless and adversarial actions,” she said.

Russia has denied responsibility for the hacking campaign. 

Representative Jim Langevin, D-R.I., chairman of a key Defense subcommittee and a member of the Cyberspace Solarium Commission, welcomed both the call for the SolarWinds review and the desire to extend the nuclear nonproliferation treaty. However, he cautioned the administration to pay attention to clear differences between the two policy areas.

“It is important to recognize—as we lay out in the Solarium Commission report—the difference between nuclear and cyber deterrence,” he told Nextgov. “Whereas nuclear deterrence has historically relied on drawing clear red lines, cyber conflict has, to date, almost exclusively existed in the ‘gray zone’ below the level of war. The diverse array of effects that can be achieved with cyber tools is why building up our resilience and developing norms of responsible state behavior are so important—we can’t simply rely on the threat of cost imposition after the fact.”

Langevin’s optimism about the intelligence review included an expectation that it would take a more comprehensive approach, and not be limited to computer screens and code.

“I have the utmost respect for [Director of National Intelligence Avril Haines], and I am confident she will lead a thorough review of any intelligence failures that may have allowed the Russians to infest our supply chain,” he said. “In particular, I hope that Director Haines does not confine her review to any missed cyber forensics. We need to do a much better job marshaling all-source intelligence to defeat cyber threats. For a campaign as pervasive as SolarWinds, there are doubtless clues that go far beyond zeroes and ones, and our intelligence community must spend more of an effort connecting those dots.” 

Cybersecurity experts pushed back on a Thursday New York Times report that more than a thousand Russian software engineers were likely involved in the SolarWinds campaign, in which the paper cited intelligence officials. 

“This number isn’t credible as presented, & if this is what our government really thinks & the advice it is getting is pushing this “>1000 engineers” number, we will not have the right risk assessment to prep for the next attack adequately,” Luta Security founder and CEO Katie Moussouris tweeted in reaction to the report. “Hacker hyperbole harms more than helps.”

Moussouris noted the role media reports play in shaping policy and flagged misdirection of officials’ attention as an undesirable consequence.

While the inflation of the number of software engineers in one espionage campaign might seem innocuous, remember Gov is itching to respond to #SolarWinds & whatever media chooses to amplify, present without evidence, debunk, or bury will help set direction in real response policy,” she wrote. “It has been my direct experience that media setting misleading narratives send policy makers & lawmakers off chasing the wrong bits first, materially damaging both the US & world readiness to meet the real challenges.”

The assessment by U.S. officials that the hacking campaign was “likely Russian” in origin followed news reports by major outlets citing anonymous sources on Russian involvement.

FireEye, the cybersecurity intelligence firm that uncovered the SolarWinds compromise, continues to resist attributing the hack to Russia, although it said the sophisticated nature of techniques used suggest a nation-state was responsible.  

Security firm Symantec revealed more about how the perpetrators went about sending data from victim systems to themselves through randomly generated URL paths. On Friday the firm published a final installation in a series of blogs deciphering the techniques used by the SolarWinds hackers. According to the latest blog, the hackers used different methods to mask their activity, including ones beyond encryption, based on the amount of data they were removing.

“Instead of sending the encrypted data directly, as when the data is greater than 10,000 bytes, the data is steganographically sent,” the firm explained. 

Where encryption scrambles data so it’s indecipherable without a key, steganography refers to hiding the data as it’s transported in another vehicle. In cases where under 10,000 bytes were being exfiltrated, the hackers masqueraded them as an innocent clump of the data format JSON, which is commonly used to communicate between servers and browsers and is not dependent on any particular programming language. 

Microsoft promoted its own security tools in a post Wednesday delving into the second phase of the hacking campaign, where the perpetrators established command and control of target systems and moved laterally within organizations’ networks.

Microsoft warned that the goal of the threat actor is likely to remain in organizations’ networks for as long as possible without being detected, necessitating extended detection and response, or XDR tools.

“Affected organizations without an XDR solution like Microsoft 365 Defender in place will have a difficult job of performing incident response,” the post reads. “Modern attacks like Solorigate highlight the need for organizations to use advanced security solutions like Microsoft 365 Defender and Azure Sentinel and operate security response under an ‘assume breach’ mentality.”

Reference: https://www.nextgov.com/cybersecurity/2021/01/hack-roundup-biden-orders-intel-assessment-suspected-russian-malfeasance/171579/

Share196Tweet123Share49
AZURE SECURITY NEWS EDITOR

AZURE SECURITY NEWS EDITOR

Related Posts

Telecom Provider Migrates Confidently to Microsoft Azure with Fortinet’s Dynamic Cloud Security Solutions

Veeam Backup & Replication 11: Enhanced data management for a multi-cloud environment

by AZURE SECURITY NEWS EDITOR
February 25, 2021
0

Veeam Software announced general availability of new Veeam Backup & Replication v11, enabling the most advanced data protection solution for cloud,...

Microsoft Azure Forms Collaboration to Enhance AI in Healthcare

Azure Defender is now available for all IoT and OT devices

by AZURE SECURITY NEWS EDITOR
February 1, 2021
0

Microsoft announced Azure Defender for IoT hitting general availability for IoT and OT devices.This is a major step forward in...

Microsoft Outlines How To Set Up Windows Virtual Desktop

Enterprise Key Management (EKM) Market Incredible Possibilities, Growth Analysis and Forecast To 2025 – Google, EMC Corporation, Hewlett-Packard Enterprise, Gemalto N.V.

by AZURE SECURITY NEWS EDITOR
January 25, 2021
0

According to a new research report titled Enterprise Key Management (EKM) Market Global Industry Perspective, Comprehensive Analysis And Forecast by...

How to use Microsoft Sysmon, Azure Sentinel to log security events

Department of Homeland Security issues $3.3bn data center and cloud solicitation

by AZURE SECURITY NEWS EDITOR
January 25, 2021
0

The Department of Homeland Security has updated its solicitation for data center and cloud optimization services, with up to $3.35bn...

  • Trending
  • Comments
  • Latest
Microsoft’s CyberX Acquisition Boosts Security of Azure IoT Lineup

AZURE DEFAULT RESOURCE GROUP AND DEFAULT WORKSPACE: WHAT ARE THEY?

December 14, 2020
Microsoft Seriously Beefs Up Security in Windows Server 2019

TCS Launches Cloud Exponence on Microsoft Azure

January 21, 2021
Microsoft Launches Host of Security Products in Time for RSA

Microsoft to add two new Microsoft 365 security, compliance bundles to its line-up

November 26, 2020

Lady Gaga Pulled Off One of the Best Halftime Shows Ever

0

Barack Obama’s Now Mainly Focusing on Wearing This Casual Backwards Hat

0

Watch Justin Timberlake’s ‘Cry Me a River’ Come to Life in Mesmerizing Dance

0
How to use Microsoft Sysmon, Azure Sentinel to log security events

Microsoft Cloud Announces Three New Vertical Cloud Solutions

February 26, 2021
Innovative solutions for IT workers at home

Privacera Announces Partnership with Talend for Rapid Cloud Data Integration and Governance with Automated Privacy and Compliance

February 26, 2021
Innovative solutions for IT workers at home

What is database encryption?

February 26, 2021
Azure Security News

Copyright © 2020 - Azure Security

Navigate Site

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

No Result
View All Result
  • Home
  • News
    • Politics
    • Business
    • World
    • Science
  • Entertainment
    • Gaming
    • Music
    • Movie
    • Sports
  • Tech
    • Apps
    • Gear
    • Mobile
    • Startup
  • Lifestyle
    • Food
    • Fashion
    • Health
    • Travel

Copyright © 2020 - Azure Security

Welcome Back!

Login to your account below

Forgotten Password?

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In