fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.8K
active users

#nobelium

0 posts0 participants0 posts today
卡拉今天看了什麼<p>Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files | Microsoft Security Blog</p><blockquote><a href="https://www.microsoft.com/en-us/security/blog/2024/10/29/midnight-blizzard-conducts-large-scale-spear-phishing-campaign-using-rdp-files/" rel="nofollow noopener" target="_blank">Link</a></blockquote>📌<span> Summary: <br>Microsoft安全團隊於2024年1月12日偵測到一起針對其企業系統的國家級攻擊,並迅速啟動了應對程序以調查、幹擾惡意活動、減輕襲擊,並阻止攻擊者進一步訪問。經過調查後,該威脅行為者被識別為「午夜暴風雪」(Midnight Blizzard),這是一個由俄羅斯國家支持的黑客組織,亦稱為NOBELIUM。<br><br></span>🎯<span> Key Points: <br>- 事件時間: 2024年1月12日,Microsoft偵測到國家級攻擊。<br>- 應對措施: 啟動調查和幹擾惡意行為,以防止未來攻擊。<br>- 威脅行為者: 識別為「午夜暴風雪」,即NOBELIUM,屬於俄羅斯國家支持的黑客集團。<br>- 目標: 攻擊針對Microsoft的企業系統,顯示出國家級攻擊的趨勢。<br>- 安全行動: Microsoft持續監控並強化其安全防護,以應對類似事件。<br><br></span>🔖<span> Keywords: <br></span><a href="https://social.mikala.one/tags/Microsoft" rel="nofollow noopener" target="_blank">#Microsoft</a> <a href="https://social.mikala.one/tags/網絡安全" rel="nofollow noopener" target="_blank">#網絡安全</a> <a href="https://social.mikala.one/tags/午夜暴風雪" rel="nofollow noopener" target="_blank">#午夜暴風雪</a> <a href="https://social.mikala.one/tags/NOBELIUM" rel="nofollow noopener" target="_blank">#NOBELIUM</a> <a href="https://social.mikala.one/tags/國家級攻擊" rel="nofollow noopener" target="_blank">#國家級攻擊</a><p></p>
Pyrzout :vm:<p>Google Catches Russian APT Reusing Exploits From Spyware Merchants NSO Group, Intellexa <a href="https://www.securityweek.com/google-catches-russian-apt-re-using-exploits-from-spyware-merchants-nso-group-intellexa/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/google-catche</span><span class="invisible">s-russian-apt-re-using-exploits-from-spyware-merchants-nso-group-intellexa/</span></a> <a href="https://social.skynetcloud.site/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/GoogleChrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleChrome</span></a> <a href="https://social.skynetcloud.site/tags/NationState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NationState</span></a> <a href="https://social.skynetcloud.site/tags/Nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nobelium</span></a> <a href="https://social.skynetcloud.site/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://social.skynetcloud.site/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a></p>
Pyrzout :vm:<p>Russian hackers read the emails you sent us, Microsoft warns more customers <a href="https://www.bitdefender.com/blog/hotforsecurity/russian-hackers-read-your-emails-to-us-microsoft-warns-more-customers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bitdefender.com/blog/hotforsec</span><span class="invisible">urity/russian-hackers-read-your-emails-to-us-microsoft-warns-more-customers/</span></a> <a href="https://social.skynetcloud.site/tags/Securitythreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Securitythreats</span></a> <a href="https://social.skynetcloud.site/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://social.skynetcloud.site/tags/Guestblog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Guestblog</span></a> <a href="https://social.skynetcloud.site/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.skynetcloud.site/tags/Dataloss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Dataloss</span></a> <a href="https://social.skynetcloud.site/tags/CozyBear" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CozyBear</span></a> <a href="https://social.skynetcloud.site/tags/Nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nobelium</span></a></p>
ITSEC News<p>Russian hackers read the emails you sent us, Microsoft warns more customers - More of Microsoft's clients are being warned that emails they exchanged with the company ... <a href="https://www.bitdefender.com/blog/hotforsecurity/russian-hackers-read-your-emails-to-us-microsoft-warns-more-customers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bitdefender.com/blog/hotforsec</span><span class="invisible">urity/russian-hackers-read-your-emails-to-us-microsoft-warns-more-customers/</span></a> <a href="https://schleuss.online/tags/securitythreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securitythreats</span></a> <a href="https://schleuss.online/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://schleuss.online/tags/guestblog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guestblog</span></a> <a href="https://schleuss.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://schleuss.online/tags/dataloss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataloss</span></a> <a href="https://schleuss.online/tags/cozybear" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cozybear</span></a> <a href="https://schleuss.online/tags/nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nobelium</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a>-linked <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/Nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nobelium</span></a> targets French diplomatic entities<br><a href="https://securityaffairs.com/164757/apt/french-anssi-russia-nobelium-attacks.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/164757/apt</span><span class="invisible">/french-anssi-russia-nobelium-attacks.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a></p>
John Leonard<p>CISA issues emergency order on Microsoft breach by Russian hackers</p><p>Affected bodies must take immediate action, agency says</p><p><a href="https://www.computing.co.uk/news/4196664/cisa-issues-emergency-order-microsoft-breach-russian-hackers" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">computing.co.uk/news/4196664/c</span><span class="invisible">isa-issues-emergency-order-microsoft-breach-russian-hackers</span></a></p><p><a href="https://mastodon.social/tags/cisa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisa</span></a> <a href="https://mastodon.social/tags/midnightblizzard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>midnightblizzard</span></a> <a href="https://mastodon.social/tags/russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russia</span></a> <a href="https://mastodon.social/tags/nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nobelium</span></a> <a href="https://mastodon.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Pyrzout :vm:<p>US Government on High Alert as Russian Hackers Steal Critical Correspondence From Microsoft <a href="https://www.securityweek.com/us-government-on-high-alert-as-russian-hackers-steal-critical-correspondence-from-microsoft/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/us-government</span><span class="invisible">-on-high-alert-as-russian-hackers-steal-critical-correspondence-from-microsoft/</span></a> <a href="https://social.skynetcloud.site/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://social.skynetcloud.site/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://social.skynetcloud.site/tags/DataBreaches" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreaches</span></a> <a href="https://social.skynetcloud.site/tags/NationState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NationState</span></a> <a href="https://social.skynetcloud.site/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.skynetcloud.site/tags/Featured" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Featured</span></a> <a href="https://social.skynetcloud.site/tags/Nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nobelium</span></a> <a href="https://social.skynetcloud.site/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://social.skynetcloud.site/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a></p>
Pyrzout :vm:<p>US Government on High Alert as Russian Hackers Steal Critical Correspondence From Microsoft <a href="https://www.securityweek.com/us-government-on-high-alert-as-russian-hackers-steal-critical-correspondence-from-microsoft/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/us-government</span><span class="invisible">-on-high-alert-as-russian-hackers-steal-critical-correspondence-from-microsoft/</span></a> <a href="https://social.skynetcloud.site/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://social.skynetcloud.site/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://social.skynetcloud.site/tags/DataBreaches" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreaches</span></a> <a href="https://social.skynetcloud.site/tags/NationState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NationState</span></a> <a href="https://social.skynetcloud.site/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.skynetcloud.site/tags/Featured" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Featured</span></a> <a href="https://social.skynetcloud.site/tags/Nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nobelium</span></a> <a href="https://social.skynetcloud.site/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://social.skynetcloud.site/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a></p>
pablolarah<p>📄 Nobelium<br>by Craig Hart @craigaryhart <br>A static blog build on top of Notion and Nextjs, deployed on Vercel.<br><a href="https://mastodon.social/tags/blog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blog</span></a> <a href="https://mastodon.social/tags/notion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>notion</span></a> <a href="https://mastodon.social/tags/utterances" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>utterances</span></a> <a href="https://mastodon.social/tags/notionblog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>notionblog</span></a> <a href="https://mastodon.social/tags/nextjsblog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nextjsblog</span></a> <a href="https://mastodon.social/tags/vercel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vercel</span></a> <a href="https://mastodon.social/tags/nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nobelium</span></a> </p><p><a href="https://nobelium.js.org/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nobelium.js.org/</span><span class="invisible"></span></a></p>
WinFuture.de<p>Mail-Hack mit Folgen: Russische Hacker klauen Quellcode von Microsoft <a href="https://mastodon.social/tags/Hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacker</span></a> <a href="https://mastodon.social/tags/Russland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russland</span></a> <a href="https://mastodon.social/tags/Mail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mail</span></a> <a href="https://mastodon.social/tags/Code" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Code</span></a> <a href="https://mastodon.social/tags/Quellcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quellcode</span></a> <a href="https://mastodon.social/tags/PasswordSpray" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordSpray</span></a> <a href="https://mastodon.social/tags/Nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nobelium</span></a> <a href="https://mastodon.social/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://winfuture.de/news,141628.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,141628.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a>'s <a href="https://hachyderm.io/tags/spies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spies</span></a> keep hacking into <a href="https://hachyderm.io/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> in 'ongoing attack,' company says, accessed <a href="https://hachyderm.io/tags/sourcecode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sourcecode</span></a><br>In January, Microsoft disclosed that <a href="https://hachyderm.io/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MidnightBlizzard</span></a> (aka <a href="https://hachyderm.io/tags/NOBELIUM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NOBELIUM</span></a>, <a href="https://hachyderm.io/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a> or <a href="https://hachyderm.io/tags/CozyBear" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CozyBear</span></a>) had breached corporate email servers after conducting a password spray attack. Microsoft says that Midnight Blizzard is using secrets found in the stolen data to gain access to some of the company's systems and source code repositories in recent weeks. <br><a href="https://techcrunch.com/2024/03/08/microsoft-ongoing-cyberattack-russia-apt-29/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2024/03/08/micr</span><span class="invisible">osoft-ongoing-cyberattack-russia-apt-29/</span></a></p>
Claus Cramon Houmann<p>Did you notice that all the ML/AI defenses of Azure/M365 did not catch the <a href="https://mastodon.social/tags/Nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nobelium</span></a> intrusion? </p><p><a href="https://www.microsoft.com/en-us/security/blog/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">microsoft.com/en-us/security/b</span><span class="invisible">log/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/</span></a></p>
0ddj0bb<p>ICYMI: The <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/Nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nobelium</span></a> breach is a flashpoint for everyone to reconsider their calculus on legacy systems on the internet. </p><p>How are you changing the calculus you use to balance business disruption with security risk management? </p><p><a href="https://infosec.exchange/tags/Glassof0J" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Glassof0J</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a></p><p><a href="https://youtu.be/6QqK_Dq4t2w" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/6QqK_Dq4t2w</span><span class="invisible"></span></a></p>
k3ym𖺀<p>In case you missed it, <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> announced on Friday that they got <a href="https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/" rel="nofollow noopener" target="_blank">pwnd</a> by Midnight Blizzard (NOBELIUM), whom <em>"used a password spray attack to compromise a legacy non-production test tenant account and gain a foothold, and then used the account’s permissions to access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions, and exfiltrated some emails and attached documents."</em></p><p>Notably Microsoft says that there were no vulnerabilities leveraged as part of this attack: <em>"The attack was not the result of a vulnerability in Microsoft products or services."</em></p><p>This is a good reminder for us to clean up all of our test artifacts - AD accounts and objects, mailboxes, etc. This isn't talked about too much as part of routine cybersecurity hygiene, but it should be.</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nobelium</span></a></p>
0ddj0bb<p>Premiering now</p><p><a href="https://infosec.exchange/tags/Glassof0J" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Glassof0J</span></a> <a href="https://infosec.exchange/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://infosec.exchange/tags/Nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nobelium</span></a> <a href="https://infosec.exchange/tags/Breach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Breach</span></a> 2024</p><p><a href="https://youtu.be/6QqK_Dq4t2w" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/6QqK_Dq4t2w</span><span class="invisible"></span></a></p>
Pyrzout :vm:<p>Microsoft sufre un robo de correos corporativos por parte de ciberdelincuentes rusos <a href="https://blog.elhacker.net/2024/01/microsoft-sufre-un-robo-de-correos-corporativo-nobelium-rusia.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.elhacker.net/2024/01/micr</span><span class="invisible">osoft-sufre-un-robo-de-correos-corporativo-nobelium-rusia.html</span></a> <a href="https://social.skynetcloud.site/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://social.skynetcloud.site/tags/nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nobelium</span></a> <a href="https://social.skynetcloud.site/tags/rusia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rusia</span></a> <a href="https://social.skynetcloud.site/tags/msrc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>msrc</span></a> <a href="https://social.skynetcloud.site/tags/apt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apt</span></a></p>
Datarainbow Privacy Assistant✅<p>The <a href="https://mastodon.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://mastodon.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> team detected a nation-state attack on our corporate systems on January 12, 2024, and immediately activated our response process to investigate, disrupt malicious activity, mitigate the attack, and deny the threat actor further access. Microsoft has identified the threat actor as Midnight Blizzard, the <a href="https://mastodon.online/tags/russian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russian</span></a> state-sponsored actor also known as <a href="https://mastodon.online/tags/nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nobelium</span></a>. <a href="https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">msrc.microsoft.com/blog/2024/0</span><span class="invisible">1/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/</span></a></p>
janggolan<p>Microsoft Actions Following Attack by Nation State Actor Midnight Blizzard... <br><a href="https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">msrc.microsoft.com/blog/2024/0</span><span class="invisible">1/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/</span></a> <br><a href="https://mastodon.cloud/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> has identified the threat actor as Midnight Blizzard, the Russian state-sponsored actor also known as <a href="https://mastodon.cloud/tags/Nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nobelium</span></a>. As part of our ongoing commitment to responsible transparency as recently affirmed in our Secure Future Initiative (SFI), we are sharing this update.</p>
Dennis "D.C." Dietrich<p>"<a href="https://social.advancedsoftware.engineering/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a>-state hackers exploited a weak password to compromise Microsoft’s corporate network and accessed emails and documents that belonged to senior executives and employees working in security and legal teams, <a href="https://social.advancedsoftware.engineering/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> said late Friday."<br><a href="https://social.advancedsoftware.engineering/tags/BreakingNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BreakingNews</span></a> <a href="https://social.advancedsoftware.engineering/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.advancedsoftware.engineering/tags/CyberIncident" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberIncident</span></a> <a href="https://social.advancedsoftware.engineering/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://social.advancedsoftware.engineering/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://social.advancedsoftware.engineering/tags/Nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nobelium</span></a><br><a href="https://arstechnica.com/security/2024/01/microsoft-network-breached-through-password-spraying-by-russian-state-hackers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2024/</span><span class="invisible">01/microsoft-network-breached-through-password-spraying-by-russian-state-hackers/</span></a></p>
Hacker Memes<p><a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/SVR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SVR</span></a> <a href="https://infosec.exchange/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://infosec.exchange/tags/Nobelium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nobelium</span></a> <a href="https://infosec.exchange/tags/Meme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meme</span></a></p>