Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Microsoft and CrowdStrike run the overall actor occupicer to reduce the confusion
Global Security

Microsoft and CrowdStrike run the overall actor occupicer to reduce the confusion

AdminBy AdminJune 3, 2025No Comments2 Mins Read
Threat Actor Glossary
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


03 June 2025Red LakshmananIntelligence threatens / cyber -defeat

Dictionary of the actor threats

Microsoft and Crowdstrike have announced that they are united to align their individual taxonomy of the actors threatening by publishing a new cartographic actor of a joint threat.

“Having reflected where our knowledge of these actors is aligned, we will provide security specialists to connect and make decisions with greater confidence faster,” – Vas Jacob, Vice President of Microsoft Security, Vice President – Note.

The initiative is considered as a way to unleash the nicknames that private suppliers of cybersecurity are prescribed by various hacking groups that are widely classified as a nation -state, financially motivated, affecting operations, offensive subjects of the private sector and new clusters.

Cybersecurity

For example, a Russian state -owned threat that is tracked by Microsoft as Midnight Blizzard (previously Nobelium), also known as APT29, Blues, closed Urs, cozy bear, iron hemlock and heaven.

Similarly, forest snowstorms (formerly strontium) pass by other nicknames such as blue Athena, Blondelta, bear fantasy, struggle against Ursa, frozen, iron dusk, pawn, assault, seodine, shame and Ta422. Microsoft turned from using chemical elements inspired by names to Weather nomenclature with weather topics In April 2023.

According to these names for suppliers, the idea is to make the tracking of the actor, which is overlapping, much easier and avoid unwanted confusion when it comes to the attribution of threat, which, in turn, can reduce confidence, complicate the analysis and reaction of delay.

While the only system of displaying threats is a bilateral effort, Google and its mandatory subsidiary, and the Palo Alto Networks 42 unit also contribute to effort. Other cybersecurity companies are likely to join this initiative in the future. Considering this, cooperation is not aimed at creating a single standard standard.

Cybersecurity

Crowdstrike said the alignment led to successful decorations of more than 80 opponents, adding that the alliance is aimed at better correlating the alias actors threatened without following the single name scheme. He called the new dictionary “Stone Rosette”.

“In addition, when telemetry supplements each other, there is an opportunity to expand the attribution in more planes and vectors – the creation of a more perfect and accurate idea of ​​the affiliate companies that benefit the whole community,” Adam Meyers Crowdstrike – Note.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025

Iran related

June 5, 2025

Why the impact on the business should have a safety conversation

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.