unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine
After co-opting the tools and infrastructure of another nation-state threat actor to faci...
2024-12-11 17:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
blizzard
powershell
amadey
defender
Microsoft Defender XDR demonstrates 100% detection coverage across all cyberattack stages in the 2024 MITRE ATT&CK® Evaluations: Enterprise
Delivering industry-leading detection for a sixth consecutive yearFor the sixth year...
2024-12-11 17:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
defender
cyberattack
positives
New Microsoft Purview features help protect and govern your data in the era of AI
In today’s evolving digital landscape, safeguarding data has become a challenge for organizations o...
2024-12-10 17:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
purview
dlp
copilot
Why security leaders trust Microsoft Sentinel to modernize their SOC
Security information and event management (SIEM) solutions have long served as the indispensable ne...
2024-12-6 02:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
flexibility
cloud
siems
8 years as a Leader in the Gartner® Magic Quadrant™ for Access Management
In mid-October, we released our 2024 Microsoft Digital Defense Report, which revealed over 600 mill...
2024-12-6 01:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
security
passkeys
quadrant
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage
Based on both Microsoft Threat Intelligence’s findings and those reported by governments...
2024-12-5 01:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
blizzard
0156
microsoft
c2
defender
Explore new Microsoft Entra capabilities at Gartner® Identity & Access Management Summit 2024
Identity and network access is the foundation of modern cybersecurity, with 66% of attacks involvin...
2024-12-5 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
entra
copilot
network
Follow-up on Ignite with Ask Microsoft Anything: Microsoft Security edition
AI transformation starts with security. This was a major theme across the majority of the big news...
2024-12-3 01:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
copilot
ignite
exposure
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON
This year at CYBERWARCON, Microsoft Threat Intelligence analysts are sharing research and...
2024-11-22 19:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
north
korean
microsoft
2077
korea
AI innovations for a more secure future unveiled at Microsoft Ignite
In today’s rapidly changing cyberthreat landscape, influenced by global events and AI advancements,...
2024-11-19 21:30:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
copilot
purview
cloud
Microsoft Data Security Index annual report highlights evolving generative AI security needs
Generative AI presents companies of all sizes with opportunities to increase efficiency and drive i...
2024-11-14 01:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
generative
adoption
microsoft
increases
DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration
In 2022, the United States Department of Defense (DoD) released its formal Zero Trust (ZT) Strategy...
2024-11-12 01:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
navy
dod
zt
More value, less risk: How to implement generative AI across the organization securely and responsibly
The technology landscape is undergoing a massive transformation, and AI is at the center...
2024-11-8 01:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
generative
addressing
biases
regulatory
Zero Trust Workshop: Advance your knowledge with an online resource
Microsoft is on the front lines helping secure customers worldwide—analyzing and responding to cybe...
2024-11-7 01:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
workshop
microsoft
pillar
pillars
How Microsoft Defender for Office 365 innovated to address QR code phishing attacks
Over the last year, the cybersecurity industry faced a significant surge in QR code phishing campai...
2024-11-5 01:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
qr
phishing
security
microsoft
defender
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network
Since August 2023, Microsoft has observed intrusion activity targeting and successfully s...
2024-11-1 01:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
1658
0940
network
7 cybersecurity trends and tips for small and medium businesses to stay protected
As October draws to a close, marking 21 years of Cybersecurity Awareness Month, cyberattacks contin...
2024-11-1 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
smbs
security
cyberattack
Microsoft Ignite: Sessions and demos to improve your security strategy
Now more than ever is the time for every organization to prioritize security. The use of AI by cybe...
2024-10-31 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
ignite
copilot
Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files
Since October 22, 2024, Microsoft Threat Intelligence has observed Russian threat actor M...
2024-10-30 03:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cloudeu
west
microsoft
mil
cloudus
Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action
Healthcare organizations are an increasingly attractive target for threat actors. In a new Microsof...
2024-10-23 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
healthcare
ransomware
security
microsoft
Previous
6
7
8
9
10
11
12
13
Next