• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft expands free logging capabilities for all u.s. federal agencies

Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies

You are here: Home / General Cyber Security News / Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies
February 24, 2024

Microsoft has expanded cost-free logging abilities to all U.S. federal agencies working with Microsoft Purview Audit irrespective of the license tier, far more than 6 months following a China-joined cyber espionage marketing campaign concentrating on two dozen businesses came to light.

“Microsoft will routinely empower the logs in purchaser accounts and enhance the default log retention time period from 90 times to 180 days,” the U.S. Cybersecurity and Infrastructure Security Company (CISA) explained.

“Also, this knowledge will provide new telemetry to assist more federal organizations satisfy logging necessities mandated by [Office of Management and Budget] Memorandum M-21-31.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

Microsoft, in July 2023, disclosed that a China-centered nation-condition action team regarded as Storm-0558 gained unauthorized obtain to roughly 25 entities in the U.S. and Europe as very well as a smaller number of associated person client accounts.

“Storm-0558 operates with a high degree of technological tradecraft and operational security,” the organization noted. “The actors are keenly mindful of the target’s natural environment, logging insurance policies, authentication specifications, policies, and methods.”

The marketing campaign is thought to have commenced in May perhaps 2023, but detected only a thirty day period later on just after a U.S. federal company, later disclosed to be the Point out Division, uncovered suspicious action in unclassified Microsoft 365 audit logs and noted it to Microsoft.

The breach was detected by leveraging increased logging in Microsoft Purview Audit, specially employing the MailItemsAccessed mailbox-auditing motion that is ordinarily out there for High quality subscribers.

The Windows maker subsequently acknowledged that a validation error in its source code allowed for Azure Energetic Listing (Azure Advertisement) tokens to be forged by Storm-0558 employing a Microsoft account (MSA) shopper signing important, and then use them to penetrate the mailboxes.

Cybersecurity

The attackers are estimated to have stolen at least 60,000 unclassified email messages from Outlook accounts belonging to Point out Division officials stationed in East Asia, the Pacific, and Europe, Reuters reported in September 2023. Beijing has denied the allegations.

It also faced intensive scrutiny for withholding fundamental-yet-critical logging abilities to entities that are on the much more costly E5 or G5 plan, prompting the corporation to make alterations.

“We figure out the crucial relevance that innovative logging performs in enabling federal organizations to detect, reply to, and reduce even the most complex cyberattacks from well-resourced, point out-sponsored actors,” Microsoft’s Candice Ling said. “For this cause, we have been collaborating across the federal authorities to present obtain to superior audit logs.”

Observed this post attention-grabbing? Adhere to us on Twitter  and LinkedIn to go through far more unique material we publish.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «dormant pypi package compromised to spread nova sentinel malware Dormant PyPI Package Compromised to Spread Nova Sentinel Malware
Next Post: Authorities Claim LockBit Admin “LockBitSupp” Has Engaged with Law Enforcement authorities claim lockbit admin "lockbitsupp" has engaged with law enforcement»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.