Microsoft Security Blog
订阅

近期历史最近 100 条记录

2024-11-19 Microsoft Data Security Index annual report highlights evolving generative AI security needs Herain Oberoi
2024-11-19 DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration Steve Faehl
2024-11-19 More value, less risk: How to implement generative AI across the organization securely and responsibly Bret Arsenault
2024-11-19 ​​Zero Trust Workshop: Advance your knowledge with an online resource Mike Adams
2024-11-05 How Microsoft Defender for Office 365 innovated to address QR code phishing attacks Ramya Chitrakar
2024-11-05 ​​Microsoft now a Leader in three major analyst reports for SIEM Rob Lefferts
2024-11-02 ​​Microsoft now a Leader in three major analyst reports for SIEM Rob Lefferts
2024-11-02 Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network Storm ‧ Microsoft Threat Intelligence
2024-11-02 ​​7 cybersecurity trends and tips for small and medium businesses to stay protected Security strategies ‧ Scott Woodgate
2024-11-02 Microsoft Ignite: Sessions and demos to improve your security strategy Dasha Zenkovich
2024-11-02 Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files Midnight Blizzard (NOBELIUM) ‧ Microsoft Threat Intelligence
2024-10-27 Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action Ransomware ‧ Sherrod DeGrippo
2024-10-20 New macOS vulnerability, “HM Surf”, could lead to unauthorized data access macOS ‧ Microsoft Threat Intelligence
2024-10-20 Escalating cyber threats demand stronger global defense and cooperation Tom Burt
2024-10-13 Microsoft’s guidance to help mitigate Kerberoasting   Windows ‧ David Weston
2024-10-11 ​​Cyber Signals Issue 8 | Education under siege: How cybercriminals target our schools​​ Microsoft Threat Intelligence
2024-10-09 File hosting services misused for identity phishing Adversary-in-the-middle (AiTM) ‧ Microsoft Threat Intelligence
2024-10-09 Microsoft Defender for Cloud remediated threats 30% faster than other solutions, according to Forrester TEI study CNAPP ‧ Microsoft Security Team
2024-10-09 Cybersecurity Awareness Month: Securing our world—together Vasu Jakkal
2024-10-02 Storm-0501: Ransomware attacks expanding to hybrid cloud environments Credential theft ‧ Microsoft Threat Intelligence
2024-09-26 ​​Microsoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms Gartner Magic Quadrant ‧ Rob Lefferts
2024-09-26 Activate your data responsibly in the era of AI with Microsoft Purview Rudra Mitra
2024-09-26 Microsoft Trustworthy AI: Unlocking human potential starts with trust    Takeshi Numoto
2024-09-26 ​​Securing our future: September 2024 progress update on Microsoft’s Secure Future Initiative (SFI) Charlie Bell
2024-09-22 Join us at Microsoft Ignite 2024 and learn to build a security-first culture with AI Benjamin Lim
2024-09-22 How comprehensive security simplifies the defense of your digital estate Vasu Jakkal
2024-09-04 North Korean threat actor Citrine Sleet exploiting Chromium zero-day Sleet ‧ Microsoft Threat Intelligence and Microsoft Security Response Center (MSRC)
2024-08-30 The art and science behind Microsoft threat hunting: Part 3 Microsoft Incident Response
2024-08-30 Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations Sandstorm ‧ Microsoft Threat Intelligence
2024-08-27 How Microsoft Entra ID supports US government agencies in meeting identity security requirements Joy Chik
2024-08-24 Microsoft AI Tour: Hear the latest product innovations to elevate your security strategy Jessica Afeku
2024-08-24 Microsoft again ranked number one in modern endpoint security market share Rob Lefferts
2024-08-24 Windows Security best practices for integrating and managing security tools David Weston
2024-08-11 Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE Android ‧ Microsoft Threat Intelligence
2024-08-11 New Microsoft whitepaper shares how to prepare your data for secure AI adoption Microsoft 365 ‧ Herain Oberoi
2024-08-11 How Microsoft and NIST are collaborating to advance the Zero Trust Implementation Mark Simos
2024-08-11 Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption Ransomware ‧ Microsoft Threat Intelligence
2024-07-26 Onyx Sleet uses array of malware to gather intelligence for North Korea Log4j ‧ Microsoft Threat Intelligence
2024-07-25 Zero Trust in the Age of AI: Join our online event to learn how to strengthen your security posture Microsoft Security Team
2024-07-23 Connect with Microsoft Security at Black Hat USA 2024​​ Dasha Zenkovich
2024-07-23 Microsoft Purview Data Governance will be generally available September 1, 2024 Rohan Kumar
2024-07-15 Simplified Zero Trust security with the Microsoft Entra Suite and unified security operations platform, now generally available Vasu Jakkal and Joy Chik
2024-07-04 Vulnerabilities in PanelView Plus devices could lead to remote code execution Microsoft Threat Intelligence
2024-06-29 Working with a cybersecurity committee of the board Steve Vandenberg
2024-06-29 How to boost your incident response readiness Microsoft Incident Response
2024-06-29 Mitigating Skeleton Key, a new type of generative AI jailbreak technique Mark Russinovich
2024-06-22 Microsoft Defender Experts for XDR recognized in the latest MITRE Engenuity ATT&CK® Evaluation for Managed Services Ryan Kivett
2024-06-14 Microsoft Incident Response tips for managing a mass password reset Microsoft Incident Response
2024-06-14 How to achieve cloud-native endpoint management with Microsoft Intune Jason Roszak
2024-06-12 Microsoft is named a leader in the Forrester Wave for XDR Forrester Waves ‧ Rob Lefferts
2024-06-05 AI jailbreaks: What they are and how they can be mitigated Microsoft Threat Intelligence
2024-06-05 The four stages of creating a trust fabric with identity and network security Joy Chik
2024-06-05 Microsoft is again named the overall leader in the Forrester Wave for XDR Forrester Waves ‧ Rob Lefferts
2024-06-04 Exposed and vulnerable: Recent attacks highlight critical need to protect internet-exposed OT devices Microsoft Threat Intelligence
2024-06-03 6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security strategy CNAPP ‧ Andrew Conway
2024-06-03 Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks Sleet ‧ Microsoft Threat Intelligence
2024-05-25 Cyber Signals: Inside the growing risk of gift card fraud Vasu Jakkal
2024-05-25 New Windows 11 features strengthen security to address evolving cyberthreat landscape Windows ‧ David Weston
2024-05-17 Threat actors misusing Quick Assist in social engineering attacks leading to ransomware Microsoft Threat Intelligence
2024-05-17 Microsoft is again named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management​​ Gartner Magic Quadrant ‧ Rob Lefferts
2024-05-17 How implementing a trust fabric strengthens identity and network Joy Chik
2024-05-09 Microsoft announces the 2024 Microsoft Security Excellence Awards winners Maria Thomson
2024-05-09 New capabilities to help you secure your AI transformation Vasu Jakkal
2024-05-09 Security above all else—expanding Microsoft’s Secure Future Initiative Charlie Bell
2024-05-03 “Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps Android ‧ Microsoft Threat Intelligence
2024-05-03 Microsoft introduces passkeys for consumer accounts Vasu Jakkal and Joy Chik
2024-05-02 ​​Investigating industrial control systems using Microsoft’s ICSpector open-source framework Maayan Shaul
2024-04-27 5 ways a CNAPP can strengthen your multicloud security environment CNAPP ‧ Vlad Korsunsky
2024-04-27 New Microsoft Incident Response guide helps simplify cyberthreat investigations Windows ‧ Microsoft Incident Response
2024-04-27 Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials Blizzard ‧ Microsoft Threat Intelligence
2024-04-19 Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters Cryptocurrency mining ‧ Microsoft Threat Intelligence
2024-04-19 New Microsoft guidance for the DoD Zero Trust Strategy Microsoft 365 ‧ Steve Faehl
2024-04-16 ​​Microsoft recognized as a Leader in the Forrester Wave™: Workforce Identity Platform, Q1 2024 Forrester Waves ‧ Joy Chik
2024-04-14 How Microsoft discovers and mitigates evolving attacks against AI guardrails Mark Russinovich
2024-04-08 Explore Microsoft’s AI innovations at RSA Conference 2024 Dasha Zenkovich
2024-04-08 Get end-to-end protection with Microsoft’s unified security operations platform, now in public preview Rob Lefferts
2024-04-05 Microsoft Priva announces new solutions to help modernize your privacy program Herain Oberoi and Paul Brightmore
2024-04-05 The foundation for responsible analytics with Microsoft Purview Rohan Kumar
2024-03-28 ​​Frost & Sullivan names Microsoft a Leader in the Frost Radar™: Managed Detection and Response, 2024 Srikanth Shoroff
2024-03-28 How Microsoft Incident Response and Microsoft Defender for Identity work together to detect and respond to cyberthreats Microsoft Incident Response
2023-09-05 Navigating privacy in a data-driven world with Microsoft Priva Kacey Lemieux
2023-09-05 Flax Typhoon using legitimate software to quietly access Taiwanese organizations Living off the land ‧ Microsoft Threat Intelligence
2023-08-17 How the Microsoft Incident Response team helps customers remediate threats Microsoft Incident Response
2023-08-13 New Microsoft Security innovations expand multicloud visibility and enhance multiplatform protection CNAPP ‧ Vasu Jakkal
2023-08-13 Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS  Microsoft Threat Intelligence
2023-08-10 Microsoft Purview data security mitigations for BazaCall and other human-operated data exfiltration attacks Living off the land ‧ Steve Vandenberg
2023-08-10 Boost identity protection with Axiad Cloud and Microsoft Entra ID Microsoft Entra ID ‧ Karen Larson
2023-08-10 Adopting guidance from the US National Cybersecurity Strategy to secure the Internet of Things Trickbot ‧ David Weston
2023-08-10 Microsoft AI Red Team building future of safer AI Ram Shankar Siva Kumar
2023-08-07 Cyber Signals: Sporting events and venues draw cyberthreats at increasing rates Vasu Jakkal
2023-08-07 Midnight Blizzard conducts targeted social engineering over Microsoft Teams Credential theft ‧ Microsoft Threat Intelligence
2023-08-03 Microsoft Defender for Office 365 gets highest rating in SE Labs Enterprise Email Security Services test for Q1 2023 Sehrish Khan
2023-07-29 How to connect with Microsoft Security at Black Hat USA 2023 Dasha Zenkovich
2023-07-29 Cryptojacking: Understanding and defending against cloud compute resource abuse Microsoft Threat Intelligence
2023-07-29 How to build stronger security teams Brooke Lynn Weenig and Jayson Street
2023-07-25 New Microsoft identity and data security capabilities to accelerate CMMC compliance for the Defense Industrial Base Steve Faehl
2023-07-25 Microsoft Defender Experts for XDR helps triage, investigate, and respond to cyberthreats Microsoft Security Experts
2023-07-20 Microsoft Inspire: Partner resources to prepare for the future of security with AI Vasu Jakkal and Alym Rayani
2023-07-20 ​​Expanding cloud logging to give customers deeper security visibility Vasu Jakkal
2023-07-15 Analysis of Storm-0558 techniques for unauthorized email access Microsoft Threat Intelligence

匿名用户只展示最新 100 条榜单历史,更多历史数据请登录后查看,支持时光机按天筛选