Microsoft has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon, exploiting vulnerabilities targeting internet-facing SharePoint servers. In addition, we have observed another China-based threat actor, tracked as Storm-2603, exploiting these vulnerabilities. Microsoft has released new comprehensive security updates for all supported versions of SharePoint Server (Subscription Edition, 2019, and 2016) that protect customers against these new vulnerabilities. Cust...| Microsoft Security Blog
Learn how to apply the Zero Trust framework to securing non-human identities (NHIs).| Silverfort
The rise of sophisticated cyber threats, the increasing adoption of cloud technologies, and the growing trend of remote work have all contributed to the need for robust identity security measures.| Silverfort
The impact of credential compromise goes beyond mere unauthorized access. It may result in more severe consequences such as data breaches, financial losses, and reputational damage.| Silverfort
User authentication is the process of verifying that users are who they claim to be. It is a crucial part of cybersecurity, enabling organizations to control access to systems and data.| Silverfort
Service accounts are dedicated non-human accounts used by systems, applications, and services to interact with other systems| Silverfort
Lateral movement describes the post-compromise stage in cyberattacks in which the attacker expands his footprint from the initial patient-zero machines to other servers| Silverfort
Multi-Factor Authentication (MFA) is a security mechanism that provides an additional layer of protection beyond traditional username-password authentication. It requires users to provide multiple…| Silverfort