RiskIQ Profile Banner
RiskIQ Profile
RiskIQ

@RiskIQ

Followers
11K
Following
3K
Media
456
Statuses
5K

RiskIQ is the leader in attack surface management. A subsidiary of @Microsoft, we help organizations discover, understand, and mitigate threats and exposures.

San Francisco, CA
Joined August 2009
Don't wanna be here? Send us removal request.
@RiskIQ
RiskIQ
3 years
After acquiring RiskIQ about a year ago, Microsoft continues to build on its vision to provide unmatched threat intelligence, today announcing the launch of Microsoft Defender Threat Intelligence and Microsoft Defender External Attack Surface Management:
Tweet card summary image
microsoft.com
Microsoft announces two new security products to help organizations lock down their infrastructure and reduce their overall attack surface.
0
5
9
@MsftSecIntel
Microsoft Threat Intelligence
2 years
Microsoft customers can get ongoing analysis and access additional threat actor details, related detections, IOCs, and hunting queries through Intel Profiles in Microsoft Defender Threat Intelligence and Threat Analytics in Microsoft 365 Defender.
1
7
68
@msftsecurity
Microsoft Security
3 years
Catch the top announcements in AI, identity, data protection, and endpoint management from #MSSecure. Read the blog: https://t.co/ckeY9RfBb1 #InfoSec
28
158
834
@runasand
Runa Sandvik
3 years
I created a public @RiskIQ project with domains and IP addresses which @citizenlab has linked to Pegasus infrastructure over the years. Sadly no way to indicate a timeframe for each of the entries.
0
11
33
@msftsecurity
Microsoft Security
3 years
Feeling inspired after #MSIgnite? Check out our collection of educational resources to get the most out of innovations across cloud security, threat protection, and more: https://t.co/D2KcoViyQq #CybersecurityTraining
1
8
12
@msftsecurity
Microsoft Security
3 years
It's Cybersecurity Awareness Month! This year, we highlight these four best practices: 1. Enabling multifactor authentication 2. Protecting your identity 3. Updating software 4. Recognizing #Phishing Learn more: https://t.co/dU55GPAuwH #BeCyberSmart
5
56
89
@msftsecurity
Microsoft Security
3 years
🔎 The threat hunt concludes with the second blog in our series. Learn about our hunting strategies and approach to threat intelligence innovation through openness and transparency: https://t.co/AORBIVYRL7 #ThreatHunting #IncidentResponse
Tweet card summary image
microsoft.com
The Microsoft Detection and Response Team outlines the threat hunting strategies used in incident response to conduct deep investigation.
0
21
25
@msftsecurity
Microsoft Security
3 years
Brush up on the basics: What is malware? Learn about how malware works, the common types, and how you can detect and remove it: https://t.co/4qbVY0OYwv #Malware #CybersecurityTips
0
11
21
@msftsecurity
Microsoft Security
3 years
Watch Vasu Jakkal and Charlie Bell share fresh insights about today’s threat landscape. Register for this digital event now: https://t.co/I6ct0qFxa0 #BeFearless #ThreatIntelligence
0
11
16
@msftsecurity
Microsoft Security
3 years
Ransomware has a new business model based on extortion. A newly released threat intelligence brief provides the latest insights and data on ransomware​. Learn more: https://t.co/U1rygyV5pb #CyberSignals #Ransomware
4
40
56
@msftsecurity
Microsoft Security
3 years
Threat intelligence that’s relevant, timely, and actionable. Learn what’s new in security at this digital event. Register now: https://t.co/3xaJ15gWAr #BeFearless #ThreatIntelligence
0
15
15
@msftsecurity
Microsoft Security
3 years
Join Charlie Bell at the Stop Ransomware with Microsoft Security digital event to learn how threat intelligence can help organizations prepare for the worst. Register now: https://t.co/KrTRqZwRAl #MicrosoftSecurity #ThreatIntelligence
1
17
28
@MsftSecIntel
Microsoft Threat Intelligence
3 years
Microsoft has disrupted activity by SEABORGIUM, a Russia-based actor launching persistent phishing, credential and data theft, intrusions, and hack-and-leak campaigns tied to espionage. More details + TTPs in this MSTIC blog:
Tweet card summary image
microsoft.com
The Microsoft Threat Intelligence Center (MSTIC) has observed and taken actions to disrupt campaigns launched by SEABORGIUM in campaigns involve persistent phishing and credential theft campaigns...
2
173
299
@msftsecurity
Microsoft Security
3 years
See demos of Microsoft Defender Threat Intelligence and Defender External Attack Surface Management. Register now: https://t.co/GCmaQiMhNx #BeFearless #ThreatIntelligence
0
16
27
@msftsecurity
Microsoft Security
3 years
During a cyberattack, every second counts. See a year’s worth of cybercrime through a single 60-second window: https://t.co/NxbXN1vwIs #SecurityInsider #Cyberattack
1
25
23
@TechCrunch
TechCrunch
3 years
Microsoft puts its RiskIQ acquisition to work https://t.co/1grWMzyNS7 by @fredericl
0
15
31
@RiskIQ
RiskIQ
3 years
Watch 👀 on-demand: In this webinar, RiskIQ's Steve Ginty explores #cybersecurity in government agencies, the digital supply chains providing software used across the federal computing landscape, and the shifts and challenges in the federal IT space:
microsoft.com
Discover Microsoft Defender Threat Intelligence—powerful threat intelligence software for cyber threat protection and threat solutions for your organization.
0
1
5
@MsftSecIntel
Microsoft Threat Intelligence
3 years
Microsoft discovered and patched a 0-day exploit (CVE-2022-22047) that #KNOTWEED, an Austria-based private sector offensive actor, used to deploy #Subzero malware. Analysis of campaigns, tactics, & payloads in this #MSTIC blog w/ @msftsecresponse @RiskIQ:
6
301
527
@RiskIQ
RiskIQ
3 years
Microsoft security researchers observed a new #Magecart tactic: using obfuscation techniques to deliver and hide skimming scripts - a shift from injecting scripts via vulnerability exploitation. Read the analysis, which includes RiskIQ research, here:
Tweet card summary image
microsoft.com
Web skimming campaigns now employ various obfuscation techniques to deliver and hide the skimming scripts. It’s a shift from earlier tactics where attackers conspicuously injected the malicious...
1
27
64
@msftsecurity
Microsoft Security
3 years
.@MsftSecIntel analysts track H0lyGh0st, a threat actor group targeting small and midsize businesses. Here are actions to take to detect these malware families: https://t.co/i8EaQ2tDyb #H0lyGh0st #Ransomware
1
23
26