all InfoSec news
Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction
Microsoft Security Blog www.microsoft.com
Microsoft has been tracking activity related to the financially motivated threat actor Octo Tempest, whose evolving campaigns represent a growing concern for many organizations across multiple industries.
The post Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction appeared first on Microsoft Security Blog.
actor blog campaigns credential theft destruction elevation of privilege encryption extortion human-operated ransomware industries microsoft microsoft security organizations ransomware as a service security security blog tempest threat threat actor tracking