Microsoft Malware Protection Center

Threat Research & Response Blog

Browse by Tags

  • Blog Post: A tangled web...

    The moment of infection, and the circumstances that lead to the introduction of malware to a system, are often not obvious. This short case study examines our observations and investigations into a particular example that illustrates a fairly typical method of compromise that is played out countless...
  • Blog Post: SIRv11: Putting Vulnerability Exploitation into Context

    As Vinny Gullotto, our GM blogged earlier in the week , the 11 th edition of the Security Intelligence Report (SIRv11) has been released. One of the new areas of research in this release is a study of the most prevalent kinds of vulnerability exploitation and how much of that exploitation is 0-day (short...
  • Blog Post: Piecing the malware puzzle – Exploring a spike in exploit activity

    In this post, we explore a telemetry spike in Java/OpenConnection and CVE-2011-3544 exploit activity. While reviewing user feedback from the Microsoft Malware Protection Center recently, we noticed an unprecedented amount of feedback on one particular Java/OpenConnection variant -- TrojanDownloader...