2024-11-19 |
Microsoft Data Security Index annual report highlights evolving generative AI security needs |
Herain Oberoi |
|
2024-11-19 |
DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration |
Steve Faehl |
|
2024-11-19 |
More value, less risk: How to implement generative AI across the organization securely and responsibly |
Bret Arsenault |
|
2024-11-19 |
Zero Trust Workshop: Advance your knowledge with an online resource |
Mike Adams |
|
2024-11-05 |
How Microsoft Defender for Office 365 innovated to address QR code phishing attacks |
Ramya Chitrakar |
|
2024-11-05 |
Microsoft now a Leader in three major analyst reports for SIEM |
Rob Lefferts |
|
2024-11-02 |
Microsoft now a Leader in three major analyst reports for SIEM |
Rob Lefferts |
|
2024-11-02 |
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network |
Storm ‧ Microsoft Threat Intelligence |
|
2024-11-02 |
7 cybersecurity trends and tips for small and medium businesses to stay protected |
Security strategies ‧ Scott Woodgate |
|
2024-11-02 |
Microsoft Ignite: Sessions and demos to improve your security strategy |
Dasha Zenkovich |
|
2024-11-02 |
Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files |
Midnight Blizzard (NOBELIUM) ‧ Microsoft Threat Intelligence |
|
2024-10-27 |
Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action |
Ransomware ‧ Sherrod DeGrippo |
|
2024-10-20 |
New macOS vulnerability, “HM Surf”, could lead to unauthorized data access |
macOS ‧ Microsoft Threat Intelligence |
|
2024-10-20 |
Escalating cyber threats demand stronger global defense and cooperation |
Tom Burt |
|
2024-10-13 |
Microsoft’s guidance to help mitigate Kerberoasting |
Windows ‧ David Weston |
|
2024-10-11 |
Cyber Signals Issue 8 | Education under siege: How cybercriminals target our schools |
Microsoft Threat Intelligence |
|
2024-10-09 |
File hosting services misused for identity phishing |
Adversary-in-the-middle (AiTM) ‧ Microsoft Threat Intelligence |
|
2024-10-09 |
Microsoft Defender for Cloud remediated threats 30% faster than other solutions, according to Forrester TEI study |
CNAPP ‧ Microsoft Security Team |
|
2024-10-09 |
Cybersecurity Awareness Month: Securing our world—together |
Vasu Jakkal |
|
2024-10-02 |
Storm-0501: Ransomware attacks expanding to hybrid cloud environments |
Credential theft ‧ Microsoft Threat Intelligence |
|
2024-09-26 |
Microsoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms |
Gartner Magic Quadrant ‧ Rob Lefferts |
|
2024-09-26 |
Activate your data responsibly in the era of AI with Microsoft Purview |
Rudra Mitra |
|
2024-09-26 |
Microsoft Trustworthy AI: Unlocking human potential starts with trust |
Takeshi Numoto |
|
2024-09-26 |
Securing our future: September 2024 progress update on Microsoft’s Secure Future Initiative (SFI) |
Charlie Bell |
|
2024-09-22 |
Join us at Microsoft Ignite 2024 and learn to build a security-first culture with AI |
Benjamin Lim |
|
2024-09-22 |
How comprehensive security simplifies the defense of your digital estate |
Vasu Jakkal |
|
2024-09-04 |
North Korean threat actor Citrine Sleet exploiting Chromium zero-day |
Sleet ‧ Microsoft Threat Intelligence and Microsoft Security Response Center (MSRC) |
|
2024-08-30 |
The art and science behind Microsoft threat hunting: Part 3 |
Microsoft Incident Response |
|
2024-08-30 |
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations |
Sandstorm ‧ Microsoft Threat Intelligence |
|
2024-08-27 |
How Microsoft Entra ID supports US government agencies in meeting identity security requirements |
Joy Chik |
|
2024-08-24 |
Microsoft AI Tour: Hear the latest product innovations to elevate your security strategy |
Jessica Afeku |
|
2024-08-24 |
Microsoft again ranked number one in modern endpoint security market share |
Rob Lefferts |
|
2024-08-24 |
Windows Security best practices for integrating and managing security tools |
David Weston |
|
2024-08-11 |
Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE |
Android ‧ Microsoft Threat Intelligence |
|
2024-08-11 |
New Microsoft whitepaper shares how to prepare your data for secure AI adoption |
Microsoft 365 ‧ Herain Oberoi |
|
2024-08-11 |
How Microsoft and NIST are collaborating to advance the Zero Trust Implementation |
Mark Simos |
|
2024-08-11 |
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption |
Ransomware ‧ Microsoft Threat Intelligence |
|
2024-07-26 |
Onyx Sleet uses array of malware to gather intelligence for North Korea |
Log4j ‧ Microsoft Threat Intelligence |
|
2024-07-25 |
Zero Trust in the Age of AI: Join our online event to learn how to strengthen your security posture |
Microsoft Security Team |
|
2024-07-23 |
Connect with Microsoft Security at Black Hat USA 2024 |
Dasha Zenkovich |
|
2024-07-23 |
Microsoft Purview Data Governance will be generally available September 1, 2024 |
Rohan Kumar |
|
2024-07-15 |
Simplified Zero Trust security with the Microsoft Entra Suite and unified security operations platform, now generally available |
Vasu Jakkal and Joy Chik |
|
2024-07-04 |
Vulnerabilities in PanelView Plus devices could lead to remote code execution |
Microsoft Threat Intelligence |
|
2024-06-29 |
Working with a cybersecurity committee of the board |
Steve Vandenberg |
|
2024-06-29 |
How to boost your incident response readiness |
Microsoft Incident Response |
|
2024-06-29 |
Mitigating Skeleton Key, a new type of generative AI jailbreak technique |
Mark Russinovich |
|
2024-06-22 |
Microsoft Defender Experts for XDR recognized in the latest MITRE Engenuity ATT&CK® Evaluation for Managed Services |
Ryan Kivett |
|
2024-06-14 |
Microsoft Incident Response tips for managing a mass password reset |
Microsoft Incident Response |
|
2024-06-14 |
How to achieve cloud-native endpoint management with Microsoft Intune |
Jason Roszak |
|
2024-06-12 |
Microsoft is named a leader in the Forrester Wave for XDR |
Forrester Waves ‧ Rob Lefferts |
|
2024-06-05 |
AI jailbreaks: What they are and how they can be mitigated |
Microsoft Threat Intelligence |
|
2024-06-05 |
The four stages of creating a trust fabric with identity and network security |
Joy Chik |
|
2024-06-05 |
Microsoft is again named the overall leader in the Forrester Wave for XDR |
Forrester Waves ‧ Rob Lefferts |
|
2024-06-04 |
Exposed and vulnerable: Recent attacks highlight critical need to protect internet-exposed OT devices |
Microsoft Threat Intelligence |
|
2024-06-03 |
6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security strategy |
CNAPP ‧ Andrew Conway |
|
2024-06-03 |
Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks |
Sleet ‧ Microsoft Threat Intelligence |
|
2024-05-25 |
Cyber Signals: Inside the growing risk of gift card fraud |
Vasu Jakkal |
|
2024-05-25 |
New Windows 11 features strengthen security to address evolving cyberthreat landscape |
Windows ‧ David Weston |
|
2024-05-17 |
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware |
Microsoft Threat Intelligence |
|
2024-05-17 |
Microsoft is again named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management |
Gartner Magic Quadrant ‧ Rob Lefferts |
|
2024-05-17 |
How implementing a trust fabric strengthens identity and network |
Joy Chik |
|
2024-05-09 |
Microsoft announces the 2024 Microsoft Security Excellence Awards winners |
Maria Thomson |
|
2024-05-09 |
New capabilities to help you secure your AI transformation |
Vasu Jakkal |
|
2024-05-09 |
Security above all else—expanding Microsoft’s Secure Future Initiative |
Charlie Bell |
|
2024-05-03 |
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps |
Android ‧ Microsoft Threat Intelligence |
|
2024-05-03 |
Microsoft introduces passkeys for consumer accounts |
Vasu Jakkal and Joy Chik |
|
2024-05-02 |
Investigating industrial control systems using Microsoft’s ICSpector open-source framework |
Maayan Shaul |
|
2024-04-27 |
5 ways a CNAPP can strengthen your multicloud security environment |
CNAPP ‧ Vlad Korsunsky |
|
2024-04-27 |
New Microsoft Incident Response guide helps simplify cyberthreat investigations |
Windows ‧ Microsoft Incident Response |
|
2024-04-27 |
Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials |
Blizzard ‧ Microsoft Threat Intelligence |
|
2024-04-19 |
Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters |
Cryptocurrency mining ‧ Microsoft Threat Intelligence |
|
2024-04-19 |
New Microsoft guidance for the DoD Zero Trust Strategy |
Microsoft 365 ‧ Steve Faehl |
|
2024-04-16 |
Microsoft recognized as a Leader in the Forrester Wave™: Workforce Identity Platform, Q1 2024 |
Forrester Waves ‧ Joy Chik |
|
2024-04-14 |
How Microsoft discovers and mitigates evolving attacks against AI guardrails |
Mark Russinovich |
|
2024-04-08 |
Explore Microsoft’s AI innovations at RSA Conference 2024 |
Dasha Zenkovich |
|
2024-04-08 |
Get end-to-end protection with Microsoft’s unified security operations platform, now in public preview |
Rob Lefferts |
|
2024-04-05 |
Microsoft Priva announces new solutions to help modernize your privacy program |
Herain Oberoi and Paul Brightmore |
|
2024-04-05 |
The foundation for responsible analytics with Microsoft Purview |
Rohan Kumar |
|
2024-03-28 |
Frost & Sullivan names Microsoft a Leader in the Frost Radar™: Managed Detection and Response, 2024 |
Srikanth Shoroff |
|
2024-03-28 |
How Microsoft Incident Response and Microsoft Defender for Identity work together to detect and respond to cyberthreats |
Microsoft Incident Response |
|
2023-09-05 |
Navigating privacy in a data-driven world with Microsoft Priva |
Kacey Lemieux |
|
2023-09-05 |
Flax Typhoon using legitimate software to quietly access Taiwanese organizations |
Living off the land ‧ Microsoft Threat Intelligence |
|
2023-08-17 |
How the Microsoft Incident Response team helps customers remediate threats |
Microsoft Incident Response |
|
2023-08-13 |
New Microsoft Security innovations expand multicloud visibility and enhance multiplatform protection |
CNAPP ‧ Vasu Jakkal |
|
2023-08-13 |
Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS |
Microsoft Threat Intelligence |
|
2023-08-10 |
Microsoft Purview data security mitigations for BazaCall and other human-operated data exfiltration attacks |
Living off the land ‧ Steve Vandenberg |
|
2023-08-10 |
Boost identity protection with Axiad Cloud and Microsoft Entra ID |
Microsoft Entra ID ‧ Karen Larson |
|
2023-08-10 |
Adopting guidance from the US National Cybersecurity Strategy to secure the Internet of Things |
Trickbot ‧ David Weston |
|
2023-08-10 |
Microsoft AI Red Team building future of safer AI |
Ram Shankar Siva Kumar |
|
2023-08-07 |
Cyber Signals: Sporting events and venues draw cyberthreats at increasing rates |
Vasu Jakkal |
|
2023-08-07 |
Midnight Blizzard conducts targeted social engineering over Microsoft Teams |
Credential theft ‧ Microsoft Threat Intelligence |
|
2023-08-03 |
Microsoft Defender for Office 365 gets highest rating in SE Labs Enterprise Email Security Services test for Q1 2023 |
Sehrish Khan |
|
2023-07-29 |
How to connect with Microsoft Security at Black Hat USA 2023 |
Dasha Zenkovich |
|
2023-07-29 |
Cryptojacking: Understanding and defending against cloud compute resource abuse |
Microsoft Threat Intelligence |
|
2023-07-29 |
How to build stronger security teams |
Brooke Lynn Weenig and Jayson Street |
|
2023-07-25 |
New Microsoft identity and data security capabilities to accelerate CMMC compliance for the Defense Industrial Base |
Steve Faehl |
|
2023-07-25 |
Microsoft Defender Experts for XDR helps triage, investigate, and respond to cyberthreats |
Microsoft Security Experts |
|
2023-07-20 |
Microsoft Inspire: Partner resources to prepare for the future of security with AI |
Vasu Jakkal and Alym Rayani |
|
2023-07-20 |
Expanding cloud logging to give customers deeper security visibility |
Vasu Jakkal |
|
2023-07-15 |
Analysis of Storm-0558 techniques for unauthorized email access |
Microsoft Threat Intelligence |
|