Latest Threat Intelligence (February 2024)

Microsoft

Microsoft Defender for IoT has released the February 2024 Threat Intelligence package. The package is available for download from the Microsoft Defender for IoT portal (click Updates, then Download file).  

 

Threat Intelligence updates reflect the combined impact of proprietary research and threat intelligence carried out by Microsoft security teams. Each package contains the latest CVEs (Common Vulnerabilities and Exposures), IOCs (Indicators of Compromise), and other indicators applicable to IoT/ICS/OT networks (published during the past month) researched and implemented by Microsoft Threat Intelligence Research - CPS.

 

The CVE scores are aligned with the National Vulnerability Database (NVD). Starting with the August 2023 threat intelligence updates, CVSSv3 scores are shown if they are relevant; otherwise the CVSSv2 scores are shown. 

 

 

Guidance

Customers are recommended to update their systems with the latest TI package in order to detect potential exposure risks and vulnerabilities in their networks and on their devices. Threat Intelligence packages are updated every month with the most up-to-date security information available, ensuring that Microsoft Defender for IoT can identify malicious actors and behaviors on devices.

 

What's new?

Log4j - optimized alerts when interoperating with endpoint AV.

 

Update your system with the latest TI package

The package is available for download from the Microsoft Defender for IoT portal (click Updates, then Download file), for more information, please review Update threat intelligence data | Microsoft Docs

 

 

 

 

MD5 Hash: 9e66792f9c3132094054bd61fa1a0e42

 

For cloud connected sensors, Microsoft Defender for IoT can automatically update new threat intelligence packages following their release, click here for more information.  

4 Replies

When I go on the Portal the only TI package it shows is from November 2023.

HTPB5FP8
Thank you for your comment, could you please share in which portal you are looking?

@Theo_Cohen It was on the Government Version of the Portal. I created a support ticket and they fixed it, so it is working now.