Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Microsoft provides Signing MSA with Azure Confidential VM after violation Storm-0558
Global Security

Microsoft provides Signing MSA with Azure Confidential VM after violation Storm-0558

AdminBy AdminApril 22, 2025No Comments3 Mins Read
Microsoft Secures MSA Signing
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 22, 2025Red LakshmananManagement Person / Security Cloud

Microsoft provides signing MSA

Microsoft on Monday announced that she had moved the Microsoft (MSA account) service service on Azure Convidential Virtual Machines (VMS) and that it is also in the process of migration of the Signing ID Entra.

The disclosure of information occurs seven months after the technological giant – Note It has completed the Microsoft Entra ID and MS updates for both public and government clouds to create, storage and automatic turning key signing marker Accent using Azure Managed Amail (HSM) service.

“Each of these improvements helps to mitigate the vectors we suspect that the actor used in the attack on Storm-0558 on Microsoft,” Charlie Bell, Executive Vice President on Microsoft Security, – Note In a message that shared with Hacker News on the eve of the publication.

Cybersecurity

Microsoft also noted that 90% identity tokens from Microsoft Entra ID for Apps Microsoft has been confirmed by a hardened identity development set (SDK) and that 92% of employee performance accounts are now using phishing resistant multifactal authentication

In addition to isolation of production systems and the implementation of two -year security policy, the company also stated that it protects 81% of production codes using the Foreign Ministry through checking checks.

“To reduce the risk of lateral motion, we pilot a project to move work processes and customer support scripts to a specialized tenant,” it added. “The basic security lines are executed for all types of Microsoft tenants, and the new system of tenants automatically register new tenants in our emergency response system.”

The changes are part of its safe future initiative (Sfi(

Last year, SFI acquired a craving in response to the US Security Council report (CSRB), which criticize The technological giant for a number of errors that can be avoided, which has led to a violation of nearly two dozen companies across Europe and the US, founded in China a national group called Storm-0558 in 2023.

Microsoft, in July 2023, showed that A Error verification In its source code, it is allowed to provide Azure Active Directory (Azure AD) or Entra ID tokens that will be faked with thunderstorms-0558 using the MSA key to sign up multiple organizations and receiving unauthorized access to the subsequent use of post office.

Company also at the end of last year launch Windows sustainability initiative to increase safety and reliability and avoid causing system disruptions as what happened during the shameful Crowdstrike Update Inters In July 2024.

Cybersecurity

This includes a feature called Quick Machine Recovery, which allows IT -administrator to launch certain PCs with Windows even in situations where machines can’t load. It is built in the Windows recovery environment (Winre).

“Unlike the traditional repair options that rely on the user intervention, it is automatically activated when the system fails,” correct ooms my PC – Note at the end of last month.

“The whole cloud recovery process is quite simple: it checks whether the flags/settings such as CloudRemediation, AutoreMediation and, optionally, are installed. If the environment corresponds to the conditions (for example, the network and the necessary plugin), Windows is in silence.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.