2024-10-02 |
Storm-0501: Ransomware attacks expanding to hybrid cloud environments |
Credential theft ‧ Microsoft Threat Intelligence |
|
2024-09-26 |
Microsoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms |
Gartner Magic Quadrant ‧ Rob Lefferts |
|
2024-09-26 |
Activate your data responsibly in the era of AI with Microsoft Purview |
Rudra Mitra |
|
2024-09-26 |
Microsoft Trustworthy AI: Unlocking human potential starts with trust |
Takeshi Numoto |
|
2024-09-26 |
Securing our future: September 2024 progress update on Microsoft’s Secure Future Initiative (SFI) |
Charlie Bell |
|
2024-09-22 |
Join us at Microsoft Ignite 2024 and learn to build a security-first culture with AI |
Benjamin Lim |
|
2024-09-22 |
How comprehensive security simplifies the defense of your digital estate |
Vasu Jakkal |
|
2024-09-04 |
North Korean threat actor Citrine Sleet exploiting Chromium zero-day |
Sleet ‧ Microsoft Threat Intelligence and Microsoft Security Response Center (MSRC) |
|
2024-08-30 |
The art and science behind Microsoft threat hunting: Part 3 |
Microsoft Incident Response |
|
2024-08-30 |
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations |
Sandstorm ‧ Microsoft Threat Intelligence |
|
2024-08-27 |
How Microsoft Entra ID supports US government agencies in meeting identity security requirements |
Joy Chik |
|
2024-08-24 |
Microsoft AI Tour: Hear the latest product innovations to elevate your security strategy |
Jessica Afeku |
|
2024-08-24 |
Microsoft again ranked number one in modern endpoint security market share |
Rob Lefferts |
|
2024-08-24 |
Windows Security best practices for integrating and managing security tools |
David Weston |
|
2024-08-11 |
Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE |
Android ‧ Microsoft Threat Intelligence |
|
2024-08-11 |
New Microsoft whitepaper shares how to prepare your data for secure AI adoption |
Microsoft 365 ‧ Herain Oberoi |
|
2024-08-11 |
How Microsoft and NIST are collaborating to advance the Zero Trust Implementation |
Mark Simos |
|
2024-08-11 |
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption |
Ransomware ‧ Microsoft Threat Intelligence |
|
2024-07-26 |
Onyx Sleet uses array of malware to gather intelligence for North Korea |
Log4j ‧ Microsoft Threat Intelligence |
|
2024-07-25 |
Zero Trust in the Age of AI: Join our online event to learn how to strengthen your security posture |
Microsoft Security Team |
|
2024-07-23 |
Connect with Microsoft Security at Black Hat USA 2024 |
Dasha Zenkovich |
|
2024-07-23 |
Microsoft Purview Data Governance will be generally available September 1, 2024 |
Rohan Kumar |
|
2024-07-15 |
Simplified Zero Trust security with the Microsoft Entra Suite and unified security operations platform, now generally available |
Vasu Jakkal and Joy Chik |
|
2024-07-04 |
Vulnerabilities in PanelView Plus devices could lead to remote code execution |
Microsoft Threat Intelligence |
|
2024-06-29 |
Working with a cybersecurity committee of the board |
Steve Vandenberg |
|
2024-06-29 |
How to boost your incident response readiness |
Microsoft Incident Response |
|
2024-06-29 |
Mitigating Skeleton Key, a new type of generative AI jailbreak technique |
Mark Russinovich |
|
2024-06-22 |
Microsoft Defender Experts for XDR recognized in the latest MITRE Engenuity ATT&CK® Evaluation for Managed Services |
Ryan Kivett |
|
2024-06-14 |
Microsoft Incident Response tips for managing a mass password reset |
Microsoft Incident Response |
|
2024-06-14 |
How to achieve cloud-native endpoint management with Microsoft Intune |
Jason Roszak |
|
2024-06-12 |
Microsoft is named a leader in the Forrester Wave for XDR |
Forrester Waves ‧ Rob Lefferts |
|
2024-06-05 |
AI jailbreaks: What they are and how they can be mitigated |
Microsoft Threat Intelligence |
|
2024-06-05 |
The four stages of creating a trust fabric with identity and network security |
Joy Chik |
|
2024-06-05 |
Microsoft is again named the overall leader in the Forrester Wave for XDR |
Forrester Waves ‧ Rob Lefferts |
|
2024-06-04 |
Exposed and vulnerable: Recent attacks highlight critical need to protect internet-exposed OT devices |
Microsoft Threat Intelligence |
|
2024-06-03 |
6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security strategy |
CNAPP ‧ Andrew Conway |
|
2024-06-03 |
Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks |
Sleet ‧ Microsoft Threat Intelligence |
|
2024-05-25 |
Cyber Signals: Inside the growing risk of gift card fraud |
Vasu Jakkal |
|
2024-05-25 |
New Windows 11 features strengthen security to address evolving cyberthreat landscape |
Windows ‧ David Weston |
|
2024-05-17 |
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware |
Microsoft Threat Intelligence |
|
2024-05-17 |
Microsoft is again named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management |
Gartner Magic Quadrant ‧ Rob Lefferts |
|
2024-05-17 |
How implementing a trust fabric strengthens identity and network |
Joy Chik |
|
2024-05-09 |
Microsoft announces the 2024 Microsoft Security Excellence Awards winners |
Maria Thomson |
|
2024-05-09 |
New capabilities to help you secure your AI transformation |
Vasu Jakkal |
|
2024-05-09 |
Security above all else—expanding Microsoft’s Secure Future Initiative |
Charlie Bell |
|
2024-05-03 |
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps |
Android ‧ Microsoft Threat Intelligence |
|
2024-05-03 |
Microsoft introduces passkeys for consumer accounts |
Vasu Jakkal and Joy Chik |
|
2024-05-02 |
Investigating industrial control systems using Microsoft’s ICSpector open-source framework |
Maayan Shaul |
|
2024-04-27 |
5 ways a CNAPP can strengthen your multicloud security environment |
CNAPP ‧ Vlad Korsunsky |
|
2024-04-27 |
New Microsoft Incident Response guide helps simplify cyberthreat investigations |
Windows ‧ Microsoft Incident Response |
|
2024-04-27 |
Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials |
Blizzard ‧ Microsoft Threat Intelligence |
|
2024-04-19 |
Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters |
Cryptocurrency mining ‧ Microsoft Threat Intelligence |
|
2024-04-19 |
New Microsoft guidance for the DoD Zero Trust Strategy |
Microsoft 365 ‧ Steve Faehl |
|
2024-04-16 |
Microsoft recognized as a Leader in the Forrester Wave™: Workforce Identity Platform, Q1 2024 |
Forrester Waves ‧ Joy Chik |
|
2024-04-14 |
How Microsoft discovers and mitigates evolving attacks against AI guardrails |
Mark Russinovich |
|
2024-04-08 |
Explore Microsoft’s AI innovations at RSA Conference 2024 |
Dasha Zenkovich |
|
2024-04-08 |
Get end-to-end protection with Microsoft’s unified security operations platform, now in public preview |
Rob Lefferts |
|
2024-04-05 |
Microsoft Priva announces new solutions to help modernize your privacy program |
Herain Oberoi and Paul Brightmore |
|
2024-04-05 |
The foundation for responsible analytics with Microsoft Purview |
Rohan Kumar |
|
2024-03-28 |
Frost & Sullivan names Microsoft a Leader in the Frost Radar™: Managed Detection and Response, 2024 |
Srikanth Shoroff |
|
2024-03-28 |
How Microsoft Incident Response and Microsoft Defender for Identity work together to detect and respond to cyberthreats |
Microsoft Incident Response |
|
2023-09-05 |
Navigating privacy in a data-driven world with Microsoft Priva |
Kacey Lemieux |
|
2023-09-05 |
Flax Typhoon using legitimate software to quietly access Taiwanese organizations |
Living off the land ‧ Microsoft Threat Intelligence |
|
2023-08-17 |
How the Microsoft Incident Response team helps customers remediate threats |
Microsoft Incident Response |
|
2023-08-13 |
New Microsoft Security innovations expand multicloud visibility and enhance multiplatform protection |
CNAPP ‧ Vasu Jakkal |
|
2023-08-13 |
Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS |
Microsoft Threat Intelligence |
|
2023-08-10 |
Microsoft Purview data security mitigations for BazaCall and other human-operated data exfiltration attacks |
Living off the land ‧ Steve Vandenberg |
|
2023-08-10 |
Boost identity protection with Axiad Cloud and Microsoft Entra ID |
Microsoft Entra ID ‧ Karen Larson |
|
2023-08-10 |
Adopting guidance from the US National Cybersecurity Strategy to secure the Internet of Things |
Trickbot ‧ David Weston |
|
2023-08-10 |
Microsoft AI Red Team building future of safer AI |
Ram Shankar Siva Kumar |
|
2023-08-07 |
Cyber Signals: Sporting events and venues draw cyberthreats at increasing rates |
Vasu Jakkal |
|
2023-08-07 |
Midnight Blizzard conducts targeted social engineering over Microsoft Teams |
Credential theft ‧ Microsoft Threat Intelligence |
|
2023-08-03 |
Microsoft Defender for Office 365 gets highest rating in SE Labs Enterprise Email Security Services test for Q1 2023 |
Sehrish Khan |
|
2023-07-29 |
How to connect with Microsoft Security at Black Hat USA 2023 |
Dasha Zenkovich |
|
2023-07-29 |
Cryptojacking: Understanding and defending against cloud compute resource abuse |
Microsoft Threat Intelligence |
|
2023-07-29 |
How to build stronger security teams |
Brooke Lynn Weenig and Jayson Street |
|
2023-07-25 |
New Microsoft identity and data security capabilities to accelerate CMMC compliance for the Defense Industrial Base |
Steve Faehl |
|
2023-07-25 |
Microsoft Defender Experts for XDR helps triage, investigate, and respond to cyberthreats |
Microsoft Security Experts |
|
2023-07-20 |
Microsoft Inspire: Partner resources to prepare for the future of security with AI |
Vasu Jakkal and Alym Rayani |
|
2023-07-20 |
Expanding cloud logging to give customers deeper security visibility |
Vasu Jakkal |
|
2023-07-15 |
Analysis of Storm-0558 techniques for unauthorized email access |
Microsoft Threat Intelligence |
|
2023-07-12 |
Storm-0978 attacks reveal financial and espionage motives |
Microsoft Threat Intelligence |
|
2023-07-12 |
Microsoft Entra expands into Security Service Edge and Azure AD becomes Microsoft Entra ID |
Joy Chik |
|
2023-07-12 |
Meet unprecedented security challenges by leveraging MXDR services |
Microsoft Security Experts |
|
2023-07-09 |
The five-day job: A BlackByte ransomware intrusion case study |
Microsoft Incident Response |
|
2023-07-09 |
Microsoft Defender for Endpoint is ranked number one in market share in the IDC Worldwide Corporate Endpoint Security Market Shares report, 2022 |
Rob Lefferts |
|
2023-07-06 |
11 best practices for securing data in cloud services |
Pramiti Bhatnagar and Abbas Kudrati |
|
2023-07-03 |
Patch me if you can: Cyberattack Series |
Microsoft Security Insights ‧ Microsoft Incident Response |
|
2023-07-03 |
How automation is evolving SecOps—and the real cost of cybercrime |
Brooke Lynn Weenig |
|
2023-07-03 |
Microsoft at NICE Conference: Resetting expectations and enabling diversity in the cybersecurity workforce |
Tina Romeo |
|
2023-07-03 |
Why endpoint management is key to securing an AI-powered future |
Hybrid work ‧ Steve Dispensa and Archana Devi Sunder Rajan |
|
2023-06-23 |
IoT devices and Linux-based systems targeted by OpenSSH trojan campaign |
Microsoft Threat Intelligence |
|
2023-06-21 |
Expanding horizons—Microsoft Security’s continued commitment to multicloud |
Azure ‧ Vasu Jakkal |
|
2023-06-21 |
How Microsoft and Sonrai integrate to eliminate attack paths |
Hybrid work ‧ Eugene Tcheby and Tally Shea |
|
2023-06-21 |
Cadet Blizzard emerges as a novel and distinct Russian threat actor |
Microsoft Threat Intelligence |
|
2023-06-21 |
Public preview: Improve Win32 app security via app isolation |
David Weston and Sumit Lahiri |
|
2023-06-13 |
Forrester names Microsoft a Leader in the 2023 Enterprise Email Security Wave |
Forrester Waves ‧ Rob Lefferts |
|
2023-06-10 |
Detecting and mitigating a multi-stage AiTM phishing and BEC campaign |
Microsoft Threat Intelligence |
|
2023-06-10 |
Join our digital event to learn what’s new in Microsoft Entra |
Irina Nechaeva |
|
2023-06-07 |
Why a proactive detection and incident response plan is crucial for your organization |
Security strategies ‧ Brooke Lynn Weenig and Matt Suiche |
|