March 24, 2023, 6:30 p.m. | Microsoft Security Threat Intelligence - Editor

Microsoft Security Blog www.microsoft.com

This guide provides steps organizations can take to assess whether users have been targeted or compromised by threat actors exploiting CVE-2023-23397.


The post Guidance for investigating attacks using CVE-2023-23397 appeared first on Microsoft Security Blog.

attacks blog compromised cve cve-2023-23397 cybersecurity detection and response team (dart) exploiting guidance guide microsoft microsoft security organizations security security blog threat threat actors

More from www.microsoft.com / Microsoft Security Blog

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cloud Technical Solutions Engineer, Security

@ Google | Mexico City, CDMX, Mexico

Assoc Eng Equipment Engineering

@ GlobalFoundries | SGP - Woodlands

Staff Security Engineer, Cloud Infrastructure

@ Flexport | Bellevue, WA; San Francisco, CA

Software Engineer III, Google Cloud Security and Privacy

@ Google | Sunnyvale, CA, USA

Software Engineering Manager II, Infrastructure, Google Cloud Security and Privacy

@ Google | San Francisco, CA, USA; Sunnyvale, CA, USA