Skip to content

Commit 4d165d8

Browse files
committed
Merge branch 'main' into diannegali-phishingtriage
2 parents ab1de15 + 2720224 commit 4d165d8

File tree

5 files changed

+27
-8
lines changed

5 files changed

+27
-8
lines changed

CloudAppSecurityDocs/protect-github.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ These steps can be completed independently of the [Configure GitHub Enterprise C
129129

130130
1. Select the **GitHub Profile picture** -> **your enterprises**.
131131
1. Select **your enterprise account** and choose the account you want to connect to Microsoft Defender for Cloud Apps.
132-
1. Confirm that the URL is the enterprise slug. For instance, in this example `https://github.com/enterprises/testEnterprise` *testEnterprise* is the enterprise slug.
132+
1. Confirm that the URL is the enterprise slug. For instance, in this example `https://github.com/enterprises/testEnterprise` *testEnterprise* is the enterprise slug. Enter only the enterprise slug, not the entire URL.
133133

134134
1. Select **Next**.
135135

@@ -142,7 +142,7 @@ These steps can be completed independently of the [Configure GitHub Enterprise C
142142
- **admin:org** - required for synchronizing your organization's audit log
143143
- **read:user** and **user:email** - required for synchronizing your organization's members
144144
- **repo:status** - required for synchronizing repository-related events in the audit log
145-
- **admin:enterprise** - required for SSPM capabilities, Note that provided user must be the owner of the enterprise account.
145+
- **read:enterprise** - required for SSPM capabilities. Note that provided user must be the owner of the enterprise account.
146146

147147
For more information about OAuth scopes, see [Understanding scopes for OAuth Apps](https://docs.github.com/developers/apps/building-oauth-apps/scopes-for-oauth-apps).
148148

defender-endpoint/mac-whatsnew.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,19 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
6464

6565
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
6666

67+
### Apr-2025 (Build: 101.25032.0006 | Release version: 20.125032.6.0)
68+
69+
| Build: | **101.25032.0006** |
70+
|--------------------|-----------------------|
71+
| Release version: | **20.125032.6.0** |
72+
| Engine version: | **1.1.25020.3000** |
73+
| Signature version: | **1.427.158.0** |
74+
75+
##### What's new
76+
77+
- Hardware UUID is now displayed in the Security Portal
78+
- Bug and performance fixes
79+
6780
### Mar-2025 (Build: 101.25022.0003 | Release version: 20.125022.3.0)
6881

6982
| Build: | **101.25022.0003** |

defender-office-365/mdo-support-teams-sec-ops-guide.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier1
1717
description: A prescriptive playbook for SecOps personnel to manage Microsoft Teams protection in Microsoft Defender for Office 365.
1818
ms.service: defender-office-365
19-
ms.date: 04/16/2025
19+
ms.date: 04/22/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2222
---
@@ -83,6 +83,10 @@ SecOps team members can proactively hunt for potentially malicious Teams message
8383
- **URL click** tab: This tab contains all user clicks on URLs in email, in supported Office files in SharePoint and OneDrive, and in Microsoft Teams. You can use the [available filters](threat-explorer-real-time-detections-about.md#filterable-properties-in-the-url-clicks-view-in-threat-explorer) to hunt on detection data.
8484

8585
- On the **Advanced hunting** page in the Defender portal at <https://security.microsoft.com/v2/advanced-hunting>. The following hunting tables are available for Teams-related threats:
86+
87+
> [!NOTE]
88+
> The hunting tables are currently in Preview.
89+
8690
- [MessageEvents](/defender-xdr/advanced-hunting-messageevents-table): Contains raw data about every internal and external Teams message that included a URL. Sender address, Sender display name, Sender type, and more are available in this table.
8791
- [MessagePostDeliveryEvents](/defender-xdr/advanced-hunting-messagepostdeliveryevents-table): Contains raw data about ZAP events on Teams messages.
8892
- [MessageUrlInfo](/defender-xdr/advanced-hunting-messageurlinfo-table): Contains raw data about URLs in Teams messages.

defender-xdr/pilot-deploy-defender-office-365.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection:
1818
- highpri
1919
- tier1
2020
ms.topic: concept-article
21-
ms.date: 05/31/2024
21+
ms.date: 04/22/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
#customer intent: To learn how to pilot and deploy Microsoft Defender for Office 365 in your production Microsoft 365 tenant.
@@ -32,14 +32,12 @@ This article assumes you have a production Microsoft 365 tenant and are piloting
3232

3333
Defender for Office 365 contributes to a Zero Trust architecture by helping to prevent or reduce business damage from a breach. For more information, see the [Prevent or reduce business damage from a breach](/security/zero-trust/adopt/prevent-reduce-business-damage-breach) business scenario in the Microsoft Zero Trust adoption framework.
3434

35-
<!---
3635
> [!TIP]
3736
> For information about configuring protection for Microsoft Teams, see the following articles:
3837
>
3938
> - [Microsoft Defender for Office 365 Plan 2 support for Microsoft Teams](/defender-office-365/mdo-support-teams-about)
4039
> - [Quickly configure Microsoft Teams protection in Microsoft Defender for Office 365 Plan 2](/defender-office-365/mdo-support-teams-quick-configure)
4140
> - [Security Operations Guide for Teams protection in Microsoft Defender for Office 365](/defender-office-365/mdo-support-teams-sec-ops-guide)
42-
--->
4341
4442
## End-to-end deployment for Microsoft Defender XDR
4543

unified-secops-platform/microsoft-threat-actor-naming.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom:
1717
- cx-ti
1818
ms.topic: conceptual
1919
search.appverid: met150
20-
ms.date: 3/5/2025
20+
ms.date: 4/22/2025
2121
---
2222

2323
# How Microsoft names threat actors
@@ -59,6 +59,7 @@ The following table lists publicly disclosed threat actor names with their origi
5959
|Amethyst Rain|Lebanon|Volatile Cedar|
6060
|[Antique Typhoon](https://www.microsoft.com/en-us/security/blog/2023/07/14/analysis-of-storm-0558-techniques-for-unauthorized-email-access/)|China|Storm-0558|
6161
|[Aqua Blizzard](https://www.microsoft.com/en-us/security/blog/2022/02/04/actinium-targets-ukrainian-organizations/)|Russia|ACTINIUM, Gamaredon, Armageddon, UNC530, shuckworm, SectorC08, Primitive Bear|
62+
|Berry Sandstorm|Iran|Storm-0852|
6263
|Blue Tsunami|Israel, Private sector offensive actor||
6364
|Brass Typhoon|China|BARIUM, APT41|
6465
|Brocade Typhoon|China|BORON, UPS, Gothic Panda, APT3, OLDCARP, TG-0110, Red Sylvan, CYBRAN|
@@ -125,7 +126,7 @@ The following table lists publicly disclosed threat actor names with their origi
125126
|Pumpkin Sandstorm|Iran|DEV-0146|
126127
|Purple Typhoon|China|POTASSIUM, GOLEM, Evilgrab, AEON, LIVESAFE, ChChes, APT10, Haymaker, Webmonder, STONE PANDA, Foxtrot, Foxmail, MenuPass, Red Apollo|
127128
|Raspberry Typhoon|China|RADIUM, LotusBlossom, APT30|
128-
|Red Sandstorm|Iran|Void Manticore|
129+
|Red Sandstorm|Iran|Void Manticore, Storm-0842|
129130
|Ruby Sleet|North Korea|CERIUM|
130131
|Ruza Flood|Russia, Influence operations||
131132
|Salmon Typhoon|China|SODIUM, APT4, MAVERICK PANDA|
@@ -147,6 +148,7 @@ The following table lists publicly disclosed threat actor names with their origi
147148
|Storm-0247|China|ToddyCat, Websiic|
148149
|Storm-0288|Group in development|FIN8|
149150
|Storm-0302|Group in development|Narwhal Spider, TA544|
151+
|[Storm-0408](https://www.microsoft.com/en-us/security/blog/2025/03/06/malvertising-campaign-leads-to-info-stealers-hosted-on-github/)|Group in development||
150152
|[Storm-0501](https://www.microsoft.com/en-us/security/blog/2024/07/29/ransomware-operators-exploit-esxi-hypervisor-vulnerability-for-mass-encryption/)|Financially motivated|DEV-0501|
151153
|Storm-0538|Group in development|FIN6|
152154
|[Storm-0539](https://www.microsoft.com/en-us/security/blog/2024/05/23/cyber-signals-inside-the-growing-risk-of-gift-card-fraud/)|Financially motivated||
@@ -163,6 +165,7 @@ The following table lists publicly disclosed threat actor names with their origi
163165
|[Storm-1674](https://www.microsoft.com/en-us/security/blog/2023/12/28/financially-motivated-threat-actors-misusing-app-installer/)|Financially motivated||
164166
|[Storm-1679](https://blogs.microsoft.com/on-the-issues/2024/09/17/russian-election-interference-efforts-focus-on-the-harris-walz-campaign/)|Influence operations||
165167
|[Storm-1811](https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/)|Financially motivated||
168+
|[Storm-1865](https://www.microsoft.com/en-us/security/blog/2025/03/13/phishing-campaign-impersonates-booking-com-delivers-a-suite-of-credential-stealing-malware/)|Group in development||
166169
|Storm-1982|China|SneakyCheff, UNK_SweetSpecter|
167170
|[Storm-2035](https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/5bc57431-a7a9-49ad-944d-b93b7d35d0fc.pdf)|Iran, Influence operations||
168171
|[Storm-2077](https://www.microsoft.com/en-us/security/blog/2024/11/22/microsoft-shares-latest-intelligence-on-north-korean-and-chinese-threat-actors-at-cyberwarcon/#storm-2077)|China|TAG-100|
@@ -180,6 +183,7 @@ The following table lists publicly disclosed threat actor names with their origi
180183
|[Volt Typhoon](https://www.microsoft.com/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques)|China|BRONZE SILHOUETTE, VANGUARD PANDA|
181184
|Wheat Tempest|Financially motivated|GOLD, Gatak|
182185
|Wisteria Tsunami|India, Private sector offensive actor|DEV-0605|
186+
|Yulong Flood|China,, Influence operations|Storm-1852|
183187
|Zigzag Hail|South Korea|DUBNIUM, Nemim, TEMPLAR, TieOnJoe, Fallout Team, Purple Pygmy, Dark Hotel, Egobot, Tapaoux, PALADIN, Darkhotel|
184188

185189
Read our announcement about this taxonomy for more information: [https://aka.ms/threatactorsblog](https://aka.ms/threatactorsblog)

0 commit comments

Comments
 (0)