Microsoft Threat Intelligence Profile picture
We are Microsoft's global network of security experts. Follow for security research and threat intelligence.

Aug 7, 2019, 9 tweets

If you were looking for a list of all the #Microsoft talks at #BHUSA, @msftsecresponse has a summary here: msrc-blog.microsoft.com/2019/07/29/mee…

@msftsecresponse At 11:15 AM today, #Microsoft’s @markmorow and @TrimarcSecurity’s @PyroTek3 will discuss the most common attacks against the cloud + effective defenses in their session, "Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)" #MSFTatBlackHat

Also at 11:15 AM today, @JosephBialek will share his research into a vulnerability reported through the Hyper-V bug bounty in his #BHUSA session "Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine" #MSFTatBlackHat

@JosephBialek At 4:00 PM, Microsoft's dana_baril and Check Point's @EyalItkin will do a collaborative talk, "He Said, She Said – Poisoned RDP Offense and Defense"

Also at 4:00 PM, @msftsecresponse's @n_joly will share research on Outlook and Exchange in the session "Hunting for Bugs, Catching Dragons" blackhat.com/us-19/briefing…

@msftsecresponse @n_joly At 9:00 AM, @bsoman3 will talk about using #machinelearning for threat intelligence in her #BHUSA session, "Death to the IOC: What’s Next in Threat Intelligence"

@msftsecresponse @n_joly @bsoman3 Then at 9:45, MSRC GM @edoerr will share details of previously undisclosed supply chain attacks. Catch him in the #BHUSA session "The Enemy Within: Modern Supply Chain Attacks"

@msftsecresponse @n_joly @bsoman3 @edoerr In "Preventing Authentication Bypass: A Tale of Two Researchers" at 2:30 PM, Terry Zhang (Tophant), Ron Chen (HackerOne), and Ravi Jaiswal (Microsoft) will share a story of research collision and the emergency response investigation that followed blackhat.com/us-19/briefing…

@msftsecresponse @n_joly @bsoman3 @edoerr It's almost time for Jonathan Birch's #BHUSA session "HostSplit: Exploitable Antipatterns in Unicode Normalization" about new exploit techniques that leverage Unicode normalization behavior to bypass URL security filters

Share this Scrolly Tale with your friends.

A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.

Keep scrolling