Deeper analysis of Storm-0558 techniques for obtaining unauthorized access to email data, tools, and unique infrastructure characteristics.| Microsoft Security Blog
Microsoft and others in the industry have called for transparency when it comes to cyber incidents so that we can learn and get better. As we’ve stated previously, we cannot ignore the exponential rise and frequency of sophisticated attacks. The growing challenges we face only reinforce our commitment to greater information sharing and industry partnership. ...| Microsoft On the Issues
Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email| msrc.microsoft.com