CISA Releases Free Tool to Detect Potential Compromised Micr

CISA Releases Free Tool to Detect Potential Compromised Microsoft Accounts | Robinson+Cole Data Privacy + Security Insider


To embed, copy and paste the code into your website or blog:
The Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) recently released a free tool that will assist organizations with identifying indicators of compromise following threat activity in Microsoft 365 and Azure Environments.
The new
CISA Hunt and Incident Response Program (CHIRP) tool, “is a forensics collection tool that CISA developed to help network defenders find indicators of compromise (IOCs)” associated with the activity CISA had earlier highlighted in previous Alerts outlining the Sparrow program.
Like the Sparrow program before it, CHIRP is designed to identify IOCs within an on-premises environment and scans only Windows operating systems. To avail yourself of the free tool, you can obtain it by accessing CISA’s GitHub repository. It is available in either a compiled executable or a python script.

Related Keywords

, Department Of Homeland Security Cybersecurity , Incident Response Program , Infrastructure Security Agency , Microsoft , Homeland Security Cybersecurity , துறை ஆஃப் தாயகம் பாதுகாப்பு இணைய பாதுகாப்பு , சம்பவம் பதில் ப்ரோக்ர்யாம் , மைக்ரோசாஃப்ட் , தாயகம் பாதுகாப்பு இணைய பாதுகாப்பு ,

© 2025 Vimarsana