Microsoft Security Blog
订阅

近期历史最近 100 条记录

2024-09-22 Join us at Microsoft Ignite 2024 and learn to build a security-first culture with AI Benjamin Lim
2024-09-22 How comprehensive security simplifies the defense of your digital estate Vasu Jakkal
2024-09-04 North Korean threat actor Citrine Sleet exploiting Chromium zero-day Sleet ‧ Microsoft Threat Intelligence and Microsoft Security Response Center (MSRC)
2024-08-30 The art and science behind Microsoft threat hunting: Part 3 Microsoft Incident Response
2024-08-30 Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations Sandstorm ‧ Microsoft Threat Intelligence
2024-08-27 How Microsoft Entra ID supports US government agencies in meeting identity security requirements Joy Chik
2024-08-24 Microsoft AI Tour: Hear the latest product innovations to elevate your security strategy Jessica Afeku
2024-08-24 Microsoft again ranked number one in modern endpoint security market share Rob Lefferts
2024-08-24 Windows Security best practices for integrating and managing security tools David Weston
2024-08-11 Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE Android ‧ Microsoft Threat Intelligence
2024-08-11 New Microsoft whitepaper shares how to prepare your data for secure AI adoption Microsoft 365 ‧ Herain Oberoi
2024-08-11 How Microsoft and NIST are collaborating to advance the Zero Trust Implementation Mark Simos
2024-08-11 Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption Ransomware ‧ Microsoft Threat Intelligence
2024-07-26 Onyx Sleet uses array of malware to gather intelligence for North Korea Log4j ‧ Microsoft Threat Intelligence
2024-07-25 Zero Trust in the Age of AI: Join our online event to learn how to strengthen your security posture Microsoft Security Team
2024-07-23 Connect with Microsoft Security at Black Hat USA 2024​​ Dasha Zenkovich
2024-07-23 Microsoft Purview Data Governance will be generally available September 1, 2024 Rohan Kumar
2024-07-15 Simplified Zero Trust security with the Microsoft Entra Suite and unified security operations platform, now generally available Vasu Jakkal and Joy Chik
2024-07-04 Vulnerabilities in PanelView Plus devices could lead to remote code execution Microsoft Threat Intelligence
2024-06-29 Working with a cybersecurity committee of the board Steve Vandenberg
2024-06-29 How to boost your incident response readiness Microsoft Incident Response
2024-06-29 Mitigating Skeleton Key, a new type of generative AI jailbreak technique Mark Russinovich
2024-06-22 Microsoft Defender Experts for XDR recognized in the latest MITRE Engenuity ATT&CK® Evaluation for Managed Services Ryan Kivett
2024-06-14 Microsoft Incident Response tips for managing a mass password reset Microsoft Incident Response
2024-06-14 How to achieve cloud-native endpoint management with Microsoft Intune Jason Roszak
2024-06-12 Microsoft is named a leader in the Forrester Wave for XDR Forrester Waves ‧ Rob Lefferts
2024-06-05 AI jailbreaks: What they are and how they can be mitigated Microsoft Threat Intelligence
2024-06-05 The four stages of creating a trust fabric with identity and network security Joy Chik
2024-06-05 Microsoft is again named the overall leader in the Forrester Wave for XDR Forrester Waves ‧ Rob Lefferts
2024-06-04 Exposed and vulnerable: Recent attacks highlight critical need to protect internet-exposed OT devices Microsoft Threat Intelligence
2024-06-03 6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security strategy CNAPP ‧ Andrew Conway
2024-06-03 Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks Sleet ‧ Microsoft Threat Intelligence
2024-05-25 Cyber Signals: Inside the growing risk of gift card fraud Vasu Jakkal
2024-05-25 New Windows 11 features strengthen security to address evolving cyberthreat landscape Windows ‧ David Weston
2024-05-17 Threat actors misusing Quick Assist in social engineering attacks leading to ransomware Microsoft Threat Intelligence
2024-05-17 Microsoft is again named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management​​ Gartner Magic Quadrant ‧ Rob Lefferts
2024-05-17 How implementing a trust fabric strengthens identity and network Joy Chik
2024-05-09 Microsoft announces the 2024 Microsoft Security Excellence Awards winners Maria Thomson
2024-05-09 New capabilities to help you secure your AI transformation Vasu Jakkal
2024-05-09 Security above all else—expanding Microsoft’s Secure Future Initiative Charlie Bell
2024-05-03 “Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps Android ‧ Microsoft Threat Intelligence
2024-05-03 Microsoft introduces passkeys for consumer accounts Vasu Jakkal and Joy Chik
2024-05-02 ​​Investigating industrial control systems using Microsoft’s ICSpector open-source framework Maayan Shaul
2024-04-27 5 ways a CNAPP can strengthen your multicloud security environment CNAPP ‧ Vlad Korsunsky
2024-04-27 New Microsoft Incident Response guide helps simplify cyberthreat investigations Windows ‧ Microsoft Incident Response
2024-04-27 Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials Blizzard ‧ Microsoft Threat Intelligence
2024-04-19 Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters Cryptocurrency mining ‧ Microsoft Threat Intelligence
2024-04-19 New Microsoft guidance for the DoD Zero Trust Strategy Microsoft 365 ‧ Steve Faehl
2024-04-16 ​​Microsoft recognized as a Leader in the Forrester Wave™: Workforce Identity Platform, Q1 2024 Forrester Waves ‧ Joy Chik
2024-04-14 How Microsoft discovers and mitigates evolving attacks against AI guardrails Mark Russinovich
2024-04-08 Explore Microsoft’s AI innovations at RSA Conference 2024 Dasha Zenkovich
2024-04-08 Get end-to-end protection with Microsoft’s unified security operations platform, now in public preview Rob Lefferts
2024-04-05 Microsoft Priva announces new solutions to help modernize your privacy program Herain Oberoi and Paul Brightmore
2024-04-05 The foundation for responsible analytics with Microsoft Purview Rohan Kumar
2024-03-28 ​​Frost & Sullivan names Microsoft a Leader in the Frost Radar™: Managed Detection and Response, 2024 Srikanth Shoroff
2024-03-28 How Microsoft Incident Response and Microsoft Defender for Identity work together to detect and respond to cyberthreats Microsoft Incident Response
2023-09-05 Navigating privacy in a data-driven world with Microsoft Priva Kacey Lemieux
2023-09-05 Flax Typhoon using legitimate software to quietly access Taiwanese organizations Living off the land ‧ Microsoft Threat Intelligence
2023-08-17 How the Microsoft Incident Response team helps customers remediate threats Microsoft Incident Response
2023-08-13 New Microsoft Security innovations expand multicloud visibility and enhance multiplatform protection CNAPP ‧ Vasu Jakkal
2023-08-13 Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS  Microsoft Threat Intelligence
2023-08-10 Microsoft Purview data security mitigations for BazaCall and other human-operated data exfiltration attacks Living off the land ‧ Steve Vandenberg
2023-08-10 Boost identity protection with Axiad Cloud and Microsoft Entra ID Microsoft Entra ID ‧ Karen Larson
2023-08-10 Adopting guidance from the US National Cybersecurity Strategy to secure the Internet of Things Trickbot ‧ David Weston
2023-08-10 Microsoft AI Red Team building future of safer AI Ram Shankar Siva Kumar
2023-08-07 Cyber Signals: Sporting events and venues draw cyberthreats at increasing rates Vasu Jakkal
2023-08-07 Midnight Blizzard conducts targeted social engineering over Microsoft Teams Credential theft ‧ Microsoft Threat Intelligence
2023-08-03 Microsoft Defender for Office 365 gets highest rating in SE Labs Enterprise Email Security Services test for Q1 2023 Sehrish Khan
2023-07-29 How to connect with Microsoft Security at Black Hat USA 2023 Dasha Zenkovich
2023-07-29 Cryptojacking: Understanding and defending against cloud compute resource abuse Microsoft Threat Intelligence
2023-07-29 How to build stronger security teams Brooke Lynn Weenig and Jayson Street
2023-07-25 New Microsoft identity and data security capabilities to accelerate CMMC compliance for the Defense Industrial Base Steve Faehl
2023-07-25 Microsoft Defender Experts for XDR helps triage, investigate, and respond to cyberthreats Microsoft Security Experts
2023-07-20 Microsoft Inspire: Partner resources to prepare for the future of security with AI Vasu Jakkal and Alym Rayani
2023-07-20 ​​Expanding cloud logging to give customers deeper security visibility Vasu Jakkal
2023-07-15 Analysis of Storm-0558 techniques for unauthorized email access Microsoft Threat Intelligence
2023-07-12 Storm-0978 attacks reveal financial and espionage motives Microsoft Threat Intelligence
2023-07-12 Microsoft Entra expands into Security Service Edge and Azure AD becomes Microsoft Entra ID Joy Chik
2023-07-12 Meet unprecedented security challenges by leveraging MXDR services Microsoft Security Experts
2023-07-09 The five-day job: A BlackByte ransomware intrusion case study Microsoft Incident Response
2023-07-09 Microsoft Defender for Endpoint is ranked number one in market share in the IDC Worldwide Corporate Endpoint Security Market Shares report, 2022 Rob Lefferts
2023-07-06 11 best practices for securing data in cloud services Pramiti Bhatnagar and Abbas Kudrati
2023-07-03 Patch me if you can: Cyberattack Series Microsoft Security Insights ‧ Microsoft Incident Response
2023-07-03 How automation is evolving SecOps—and the real cost of cybercrime Brooke Lynn Weenig
2023-07-03 Microsoft at NICE Conference: Resetting expectations and enabling diversity in the cybersecurity workforce Tina Romeo
2023-07-03 Why endpoint management is key to securing an AI-powered future Hybrid work ‧ Steve Dispensa and Archana Devi Sunder Rajan
2023-06-23 IoT devices and Linux-based systems targeted by OpenSSH trojan campaign Microsoft Threat Intelligence
2023-06-21 Expanding horizons—Microsoft Security’s continued commitment to multicloud Azure ‧ Vasu Jakkal
2023-06-21 How Microsoft and Sonrai integrate to eliminate attack paths Hybrid work ‧ Eugene Tcheby and Tally Shea
2023-06-21 Cadet Blizzard emerges as a novel and distinct Russian threat actor Microsoft Threat Intelligence
2023-06-21 Public preview: Improve Win32 app security via app isolation David Weston and Sumit Lahiri
2023-06-13 Forrester names Microsoft a Leader in the 2023 Enterprise Email Security Wave Forrester Waves ‧ Rob Lefferts
2023-06-10 Detecting and mitigating a multi-stage AiTM phishing and BEC campaign Microsoft Threat Intelligence
2023-06-10 Join our digital event to learn what’s new in Microsoft Entra Irina Nechaeva
2023-06-07 Why a proactive detection and incident response plan is crucial for your organization Security strategies ‧ Brooke Lynn Weenig and Matt Suiche
2023-06-07 XDR meets IAM: Comprehensive identity threat detection and response with Microsoft Security strategies ‧ Rob Lefferts and Alex Weinert
2023-06-07 New macOS vulnerability, Migraine, could bypass System Integrity Protection Microsoft Threat Intelligence
2023-05-25 Volt Typhoon targets US critical infrastructure with living-off-the-land techniques Microsoft Threat Intelligence
2023-05-24 Microsoft Build 2023: Announcing new identity, compliance, and security features from Microsoft Security Joy Chik
2023-05-21 Cyber Signals: Shifting tactics fuel surge in business email compromise Microsoft Security Insights ‧ Vasu Jakkal

匿名用户只展示最新 100 条榜单历史,更多历史数据请登录后查看,支持时光机按天筛选