unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
AI innovations for a more secure future unveiled at Microsoft Ignite
In today’s rapidly changing cyberthreat landscape, influenced by global events and AI advancements,...
2024-11-19 21:30:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
copilot
purview
cloud
Microsoft Data Security Index annual report highlights evolving generative AI security needs
Generative AI presents companies of all sizes with opportunities to increase efficiency and drive i...
2024-11-14 01:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
generative
adoption
microsoft
increases
DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration
In 2022, the United States Department of Defense (DoD) released its formal Zero Trust (ZT) Strategy...
2024-11-12 01:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
navy
dod
zt
More value, less risk: How to implement generative AI across the organization securely and responsibly
The technology landscape is undergoing a massive transformation, and AI is at the center...
2024-11-8 01:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
generative
addressing
biases
regulatory
Zero Trust Workshop: Advance your knowledge with an online resource
Microsoft is on the front lines helping secure customers worldwide—analyzing and responding to cybe...
2024-11-7 01:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
workshop
microsoft
pillar
pillars
How Microsoft Defender for Office 365 innovated to address QR code phishing attacks
Over the last year, the cybersecurity industry faced a significant surge in QR code phishing campai...
2024-11-5 01:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
qr
phishing
security
microsoft
defender
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network
Since August 2023, Microsoft has observed intrusion activity targeting and successfully s...
2024-11-1 01:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
1658
0940
network
7 cybersecurity trends and tips for small and medium businesses to stay protected
As October draws to a close, marking 21 years of Cybersecurity Awareness Month, cyberattacks contin...
2024-11-1 00:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
smbs
security
cyberattack
Microsoft Ignite: Sessions and demos to improve your security strategy
Now more than ever is the time for every organization to prioritize security. The use of AI by cybe...
2024-10-31 00:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
ignite
copilot
Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files
Since October 22, 2024, Microsoft Threat Intelligence has observed Russian threat actor M...
2024-10-30 03:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cloudeu
west
microsoft
mil
cloudus
Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action
Healthcare organizations are an increasingly attractive target for threat actors. In a new Microsof...
2024-10-23 00:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
healthcare
ransomware
security
microsoft
New macOS vulnerability, “HM Surf”, could lead to unauthorized data access
Microsoft Threat Intelligence uncovered a macOS vulnerability that could potentially allo...
2024-10-18 00:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
surf
microphone
security
hm
Microsoft’s guidance to help mitigate Kerberoasting
As cyberthreats continue to evolve, it’s essential for security professionals to stay inf...
2024-10-12 01:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
encryption
microsoft
passwords
security
Cyber Signals Issue 8 | Education under siege: How cybercriminals target our schools
Introduction | Security snapshot | Threat briefingDefending against attacks | Expert profile Ed...
2024-10-10 19:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
qr
phishing
File hosting services misused for identity phishing | Microsoft Security Blog
Microsoft has observed campaigns misusing legitimate file hosting services increasingly u...
2024-10-9 17:16:57 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - www.microsoft.com
microsoft
dropbox
phishing
defender
fileshared
Microsoft Defender for Cloud remediated threats 30% faster than other solutions, according to Forrester TEI™ study
The broad adoption of multicloud and hybrid infrastructures has introduced new complexity to the cl...
2024-10-8 00:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cloud
security
defender
microsoft
Cybersecurity Awareness Month: Securing our world—together
As Cybersecurity Awareness Month marks its 21st year, it’s clear that this year stands out. Phishin...
2024-10-2 00:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
phishing
era
Storm-0501: Ransomware attacks expanding to hybrid cloud environments
Microsoft has observed the threat actor tracked as Storm-0501 launching a multi-staged at...
2024-9-27 01:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
cloud
premises
ransomware
Microsoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
Since 2023, Microsoft has seen a 2.75 times increase in the number of organizations encountering ra...
2024-9-26 03:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
defender
ransomware
copilot
Activate your data responsibly in the era of AI with Microsoft Purview
This week, teams across Microsoft Fabric and Microsoft Purview are gathered in Stockholm, Sweden, f...
2024-9-26 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
purview
fabric
security
governance
Previous
-6
-5
-4
-3
-2
-1
0
1
Next