unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Mitigating Skeleton Key, a new type of generative AI jailbreak technique
In generative AI, jailbreaks, also known as direct prompt injection attacks, are maliciou...
2024-6-27 01:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
jailbreak
skeleton
security
jailbreaks
Working with a cybersecurity committee of the board
I serve on the board of a publicly traded company. I fostered the creation of the board’s...
2024-6-27 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
committee
microsoft
mandate
How to boost your incident response readiness
Cyberthreats are evolving with alarming sophistication, making it crucial for organizatio...
2024-6-26 00:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
disaster
threats
Microsoft Defender Experts for XDR recognized in the latest MITRE Engenuity ATT&CK® Evaluation for Managed Services
Microsoft Defender Experts for XDR demonstrated excellent managed extended detection and...
2024-6-18 21:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
defender
microsoft
security
cyberattack
ransomware
Microsoft Incident Response tips for managing a mass password reset
Explore how effective incident response helps organizations detect, address, and st...
2024-6-13 00:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
mass
entra
How to achieve cloud-native endpoint management with Microsoft Intune
This is the final blog post in our series highlighting the increasing benefits of becom...
2024-6-12 23:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
intune
cloud
microsoft
mindset
copilot
AI jailbreaks: What they are and how they can be mitigated
Generative AI systems are made up of multiple components that interact to provide a rich...
2024-6-5 01:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
jailbreak
generative
jailbreaks
harmful
The four stages of creating a trust fabric with identity and network security
How implementing a trust fabric strengthens identity and networkRead the b...
2024-6-5 00:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
stage
identities
fabric
Microsoft is named a leader in the Forrester Wave for XDR
“Defenders think in lists, attackers think in graphs.”1 This remains a reality for the ma...
2024-6-4 00:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
forrester
defender
unified
Microsoft is named a leader in the Forrester Wave for XDR
“Defenders think in lists, attackers think in graphs.”1 This remains a reality for the ma...
2024-6-4 00:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
forrester
defender
unified
Exposed and vulnerable: Recent attacks highlight critical need to protect internet-exposed OT devices
Since late 2023, Microsoft has observed an increase in reports of attacks focusing on int...
2024-5-31 01:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
water
aliquippa
security
plc
6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security strategy
Multicloud computing has become the foundation for digital businesses, with 86% of organi...
2024-5-30 00:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
cloud
identities
multicloud
microsoft
Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks
Microsoft has identified a new North Korean threat actor, now tracked as Moonstone Sleet...
2024-5-29 00:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
sleet
moonstone
microsoft
malicious
north
Cyber Signals: Inside the growing risk of gift card fraud
In the ever-evolving landscape of cyberthreats, staying ahead of malicious actors is a co...
2024-5-23 21:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
0539
security
cloud
microsoft
New Windows 11 features strengthen security to address evolving cyberthreat landscape
Ahead of the Microsoft Build 2024 conference, we announced a new class of Windows compute...
2024-5-21 02:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
windows
security
microsoft
lsa
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware
Since mid-April 2024, Microsoft Threat Intelligence has observed the threat actor Storm-1...
2024-5-16 00:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
assist
ransomware
qakbot
defender
Microsoft is again named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management
We are pleased to announce that Microsoft has been recognized as a Leader in the Gartner®...
2024-5-14 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
unified
copilot
quadrant
How implementing a trust fabric strengthens identity and network
The identity security landscape is transforming rapidly. Every digital experience and int...
2024-5-9 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
fabric
security
microsoft
network
identities
Microsoft announces the 2024 Microsoft Security Excellence Awards winners
At this year’s Microsoft Security Excellence Awards, we took a journey through the evolut...
2024-5-8 00:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
winner
trailblazer
misa
New capabilities to help you secure your AI transformation
AI is transforming our world, unlocking new possibilities to enhance human abilities and...
2024-5-7 00:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
defender
copilot
purview
Previous
3
4
5
6
7
8
9
10
Next