Microsoft Security Blog
订阅

近期历史最近 100 条记录

2024-05-17 Threat actors misusing Quick Assist in social engineering attacks leading to ransomware Microsoft Threat Intelligence
2024-05-17 Microsoft is again named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management​​ Gartner Magic Quadrant ‧ Rob Lefferts
2024-05-17 How implementing a trust fabric strengthens identity and network Joy Chik
2024-05-09 Microsoft announces the 2024 Microsoft Security Excellence Awards winners Maria Thomson
2024-05-09 New capabilities to help you secure your AI transformation Vasu Jakkal
2024-05-09 Security above all else—expanding Microsoft’s Secure Future Initiative Charlie Bell
2024-05-03 “Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps Android ‧ Microsoft Threat Intelligence
2024-05-03 Microsoft introduces passkeys for consumer accounts Vasu Jakkal and Joy Chik
2024-05-02 ​​Investigating industrial control systems using Microsoft’s ICSpector open-source framework Maayan Shaul
2024-04-27 5 ways a CNAPP can strengthen your multicloud security environment CNAPP ‧ Vlad Korsunsky
2024-04-27 New Microsoft Incident Response guide helps simplify cyberthreat investigations Windows ‧ Microsoft Incident Response
2024-04-27 Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials Blizzard ‧ Microsoft Threat Intelligence
2024-04-19 Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters Cryptocurrency mining ‧ Microsoft Threat Intelligence
2024-04-19 New Microsoft guidance for the DoD Zero Trust Strategy Microsoft 365 ‧ Steve Faehl
2024-04-16 ​​Microsoft recognized as a Leader in the Forrester Wave™: Workforce Identity Platform, Q1 2024 Forrester Waves ‧ Joy Chik
2024-04-14 How Microsoft discovers and mitigates evolving attacks against AI guardrails Mark Russinovich
2024-04-08 Explore Microsoft’s AI innovations at RSA Conference 2024 Dasha Zenkovich
2024-04-08 Get end-to-end protection with Microsoft’s unified security operations platform, now in public preview Rob Lefferts
2024-04-05 Microsoft Priva announces new solutions to help modernize your privacy program Herain Oberoi and Paul Brightmore
2024-04-05 The foundation for responsible analytics with Microsoft Purview Rohan Kumar
2024-03-28 ​​Frost & Sullivan names Microsoft a Leader in the Frost Radar™: Managed Detection and Response, 2024 Srikanth Shoroff
2024-03-28 How Microsoft Incident Response and Microsoft Defender for Identity work together to detect and respond to cyberthreats Microsoft Incident Response
2023-09-05 Navigating privacy in a data-driven world with Microsoft Priva Kacey Lemieux
2023-09-05 Flax Typhoon using legitimate software to quietly access Taiwanese organizations Living off the land ‧ Microsoft Threat Intelligence
2023-08-17 How the Microsoft Incident Response team helps customers remediate threats Microsoft Incident Response
2023-08-13 New Microsoft Security innovations expand multicloud visibility and enhance multiplatform protection CNAPP ‧ Vasu Jakkal
2023-08-13 Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS  Microsoft Threat Intelligence
2023-08-10 Microsoft Purview data security mitigations for BazaCall and other human-operated data exfiltration attacks Living off the land ‧ Steve Vandenberg
2023-08-10 Boost identity protection with Axiad Cloud and Microsoft Entra ID Microsoft Entra ID ‧ Karen Larson
2023-08-10 Adopting guidance from the US National Cybersecurity Strategy to secure the Internet of Things Trickbot ‧ David Weston
2023-08-10 Microsoft AI Red Team building future of safer AI Ram Shankar Siva Kumar
2023-08-07 Cyber Signals: Sporting events and venues draw cyberthreats at increasing rates Vasu Jakkal
2023-08-07 Midnight Blizzard conducts targeted social engineering over Microsoft Teams Credential theft ‧ Microsoft Threat Intelligence
2023-08-03 Microsoft Defender for Office 365 gets highest rating in SE Labs Enterprise Email Security Services test for Q1 2023 Sehrish Khan
2023-07-29 How to connect with Microsoft Security at Black Hat USA 2023 Dasha Zenkovich
2023-07-29 Cryptojacking: Understanding and defending against cloud compute resource abuse Microsoft Threat Intelligence
2023-07-29 How to build stronger security teams Brooke Lynn Weenig and Jayson Street
2023-07-25 New Microsoft identity and data security capabilities to accelerate CMMC compliance for the Defense Industrial Base Steve Faehl
2023-07-25 Microsoft Defender Experts for XDR helps triage, investigate, and respond to cyberthreats Microsoft Security Experts
2023-07-20 Microsoft Inspire: Partner resources to prepare for the future of security with AI Vasu Jakkal and Alym Rayani
2023-07-20 ​​Expanding cloud logging to give customers deeper security visibility Vasu Jakkal
2023-07-15 Analysis of Storm-0558 techniques for unauthorized email access Microsoft Threat Intelligence
2023-07-12 Storm-0978 attacks reveal financial and espionage motives Microsoft Threat Intelligence
2023-07-12 Microsoft Entra expands into Security Service Edge and Azure AD becomes Microsoft Entra ID Joy Chik
2023-07-12 Meet unprecedented security challenges by leveraging MXDR services Microsoft Security Experts
2023-07-09 The five-day job: A BlackByte ransomware intrusion case study Microsoft Incident Response
2023-07-09 Microsoft Defender for Endpoint is ranked number one in market share in the IDC Worldwide Corporate Endpoint Security Market Shares report, 2022 Rob Lefferts
2023-07-06 11 best practices for securing data in cloud services Pramiti Bhatnagar and Abbas Kudrati
2023-07-03 Patch me if you can: Cyberattack Series Microsoft Security Insights ‧ Microsoft Incident Response
2023-07-03 How automation is evolving SecOps—and the real cost of cybercrime Brooke Lynn Weenig
2023-07-03 Microsoft at NICE Conference: Resetting expectations and enabling diversity in the cybersecurity workforce Tina Romeo
2023-07-03 Why endpoint management is key to securing an AI-powered future Hybrid work ‧ Steve Dispensa and Archana Devi Sunder Rajan
2023-06-23 IoT devices and Linux-based systems targeted by OpenSSH trojan campaign Microsoft Threat Intelligence
2023-06-21 Expanding horizons—Microsoft Security’s continued commitment to multicloud Azure ‧ Vasu Jakkal
2023-06-21 How Microsoft and Sonrai integrate to eliminate attack paths Hybrid work ‧ Eugene Tcheby and Tally Shea
2023-06-21 Cadet Blizzard emerges as a novel and distinct Russian threat actor Microsoft Threat Intelligence
2023-06-21 Public preview: Improve Win32 app security via app isolation David Weston and Sumit Lahiri
2023-06-13 Forrester names Microsoft a Leader in the 2023 Enterprise Email Security Wave Forrester Waves ‧ Rob Lefferts
2023-06-10 Detecting and mitigating a multi-stage AiTM phishing and BEC campaign Microsoft Threat Intelligence
2023-06-10 Join our digital event to learn what’s new in Microsoft Entra Irina Nechaeva
2023-06-07 Why a proactive detection and incident response plan is crucial for your organization Security strategies ‧ Brooke Lynn Weenig and Matt Suiche
2023-06-07 XDR meets IAM: Comprehensive identity threat detection and response with Microsoft Security strategies ‧ Rob Lefferts and Alex Weinert
2023-06-07 New macOS vulnerability, Migraine, could bypass System Integrity Protection Microsoft Threat Intelligence
2023-05-25 Volt Typhoon targets US critical infrastructure with living-off-the-land techniques Microsoft Threat Intelligence
2023-05-24 Microsoft Build 2023: Announcing new identity, compliance, and security features from Microsoft Security Joy Chik
2023-05-21 Cyber Signals: Shifting tactics fuel surge in business email compromise Microsoft Security Insights ‧ Vasu Jakkal
2023-05-16 Microsoft Security highlights from RSA Conference 2023 Microsoft Security Insights ‧ Vasu Jakkal
2023-05-04 How Microsoft can help you go passwordless this World Password Day Security strategies ‧ Alex Weinert
2023-05-04 Forrester names Microsoft a Leader in 2023 Infrastructure-as-a-Service Platform Native Security report Shawn Bice
2023-04-28 Why you should practice rollbacks to prevent data loss in a ransomware attack DevSecOps ‧ Brooke Lynn Weenig and Tanya Janca
2023-04-27 Healthy security habits to fight credential breaches: Cyberattack Series Security strategies ‧ Microsoft Incident Response
2023-04-26 Microsoft announces the 2023 Microsoft Security Excellence Awards winners Maria Thomson
2023-04-25 Stay compliant and protect sensitive data with Zero Trust security Security strategies ‧ Rudra Mitra
2023-04-25 Getting started with the CDMC framework—Microsoft’s guide to cloud data management Mike Flasko
2023-04-21 Microsoft Entra delivers 240 percent ROI, according to new Forrester study Hybrid work ‧ Vasu Jakkal
2023-04-20 Simplified endpoint management with Microsoft Intune Suite: Adopting a long-term approach with intelligence and automation Security strategies ‧ Jason Roszak
2023-04-18 Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets Cybersecurity ‧ Microsoft Security Threat Intelligence
2023-04-18 Microsoft shifts to a new threat actor naming taxonomy Cybersecurity ‧ Microsoft Security Threat Intelligence - Editor
2023-04-18 Protect intellectual property with Govern 365 and Microsoft Purview Cybersecurity ‧ Christine Barrett
2023-04-18 See product news and on-demand sessions from Microsoft Secure AI and machine learning ‧ Christine Barrett
2023-04-14 Threat actors strive to cause Tax Day headaches Cybersecurity ‧ Microsoft Security Threat Intelligence - Editor
2023-04-13 Improve supply chain security and resiliency with Microsoft   Cybersecurity ‧ Christine Barrett
2023-04-13 Discover a new era of security with Microsoft at RSAC 2023 Cybersecurity ‧ Christine Barrett
2023-04-12 LinkedIn and Microsoft Entra introduce a new way to verify your workplace Cybersecurity ‧ Christine Barrett
2023-04-12 Guidance for investigating attacks using CVE-2022-21894: The BlackLotus campaign Cybersecurity ‧ Microsoft Security Threat Intelligence - Editor
2023-04-12 DEV-0196: QuaDream’s “KingsPawn” malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia Cybersecurity ‧ Microsoft Security Threat Intelligence
2023-04-08 MERCURY and DEV-1084: Destructive attack on hybrid environment Cybersecurity ‧ Microsoft Security Threat Intelligence
2023-04-07 DevOps threat matrix Cybersecurity ‧ Microsoft Security Threat Intelligence
2023-04-07 Secure hybrid and remote workplaces with a Zero Trust approach Cybersecurity ‧ Christine Barrett
2023-04-05 Discover a new era of security with Microsoft at RSAC 2023 Cybersecurity ‧ Christine Barrett
2023-03-31 Latest Microsoft Entra advancements strengthen identity security Cybersecurity ‧ Christine Barrett
2023-03-29 Microsoft Secure: Explore innovations transforming the future of security AI and machine learning ‧ Christine Barrett
2023-03-28 Microsoft Incident Response Retainer is generally available Cybersecurity ‧ Christine Barrett
2023-03-25 Guidance for investigating attacks using CVE-2023-23397 Cybersecurity ‧ Microsoft Security Threat Intelligence - Editor
2023-03-24 Microsoft continues to innovate to help secure small businesses Cybersecurity ‧ Brianna McGovern
2023-03-23 The next wave of multicloud security with Microsoft Defender for Cloud, a Cloud-Native Application Protection Platform (CNAPP) Cybersecurity ‧ Christine Barrett
2023-03-23 Microsoft recognized as a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023 Compliance ‧ Christine Barrett
2023-03-22 Gain real-time identity protection with Microsoft and Recorded Future Cybersecurity ‧ Christine Barrett
2023-03-21 Microsoft achieves first native Cloud Data Management Capabilities certification Compliance ‧ Emma Williams
2023-03-21 Leverage cloud-powered security with Microsoft Defender for IoT Cybersecurity ‧ Christine Barrett

匿名用户只展示最新 100 条榜单历史,更多历史数据请登录后查看,支持时光机按天筛选