unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Join the new Microsoft Security experience at Microsoft Ignite 2023
During the past few years, we’ve managed a lot of change and disruption in our secur...
2023-9-29 00:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
ignite
breakout
leaders
New security features in Windows 11 protect users and empower IT
While attacks are getting more sophisticated, so are our defenses. With recent innov...
2023-9-27 01:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
windows
security
microsoft
passkeys
New Microsoft security tools to protect families and businesses
Today marks an exciting milestone in Microsoft’s AI journey. This morning, at an eve...
2023-9-21 23:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
windows
passkeys
defender
Microsoft 365 Defender demonstrates 100 percent protection coverage in the 2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise
For the fifth consecutive year, Microsoft 365 Defender demonstrated industry-leading...
2023-9-20 21:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
defender
engenuity
evaluations
Forrester names Microsoft a Leader in the 2023 Zero Trust Platform Providers Wave™ report
Microsoft is proud to be recognized as a Leader in the Forrester Wave™: Zero Trust P...
2023-9-20 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
forrester
security
microsoft
wave
threats
Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets
Since February 2023, Microsoft has observed password spray activity against thousand...
2023-9-15 00:30:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
sandstorm
peach
microsoft
entra
Uncursing the ncurses: Memory corruption vulnerabilities found in library
Microsoft has discovered a set of memory corruption vulnerabilities in a library cal...
2023-9-14 19:30:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
terminfo
ncurses
security
microsoft
Malware distributor Storm-0324 facilitates ransomware access
The threat actor that Microsoft tracks as Storm-0324 is a financially motivated grou...
2023-9-13 01:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
0324
ransomware
phishing
defender
Cloud storage security: What’s new in the threat matrix
Today, we announce the release of a second version of the threat matrix for storage...
2023-9-8 01:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
attackers
cloud
replication
sftp
victim
Navigating privacy in a data-driven world with Microsoft Priva
Data protection and privacy have become business imperatives. In a global survey con...
2023-9-1 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
priva
microsoft
regulations
security
Flax Typhoon using legitimate software to quietly access Taiwanese organizations
SummaryMicrosoft has identified a nation-state activity group tracked as Flax T...
2023-8-25 00:30:0 | 阅读: 13 |
收藏
|
Microsoft Security Blog - www.microsoft.com
typhoon
flax
network
microsoft
windows
How the Microsoft Incident Response team helps customers remediate threats
Each year, organizations face tens of billions of malware, phishing, and credential...
2023-8-16 00:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
defender
ransomware
monitoring
Download Volume Shadow Copy Service SDK 7.2 from Official Microsoft Download Center
If your download does not start after 30 seconds,...
2018-03-17 23:38:28 | 阅读: 51 |
收藏
|
www.microsoft.com
microsoft
cumulative
download
installs
Previous
8
9
10
11
12
13
14
15
Next