unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Hear from Microsoft Security experts at these top cybersecurity events in 2025
Inspiration can spark in an instant when you’re at a conference. Perhaps you discover a new tool du...
2025-2-3 17:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
dates
3 priorities for adopting proactive identity and access security in 2025
If 2024 taught us anything, it’s that a proactive, no-compromises approach to security is essential...
2025-1-28 17:0:0 | 阅读: 11 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
entra
identities
Fast-track generative AI security with Microsoft Purview
As a data security global black belt, I help organizations secure AI solutions. They are concerned...
2025-1-27 17:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
purview
security
generative
New Star Blizzard spear-phishing campaign targets WhatsApp accounts
In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we...
2025-1-16 17:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
blizzard
phishing
defender
domainlist
Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions
Microsoft Threat Intelligence discovered a new macOS vulnerability that could allow attac...
2025-1-13 17:0:0 | 阅读: 12 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
processes
bypass
3 takeaways from red teaming 100 generative AI products
Microsoft’s AI red team is excited to share our whitepaper, “Lessons from Red Teaming 100 Generativ...
2025-1-13 16:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
teaming
security
generative
whitepaper
microsoft
Why security teams rely on Microsoft Defender Experts for XDR for managed detection and response
The expanding attack surface is creating more opportunities for exploitation and adding to the pres...
2025-1-6 17:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
defender
phishing
New Microsoft guidance for the CISA Zero Trust Maturity Model
The Cybersecurity Infrastructure Security Agency (CISA) Zero Trust Maturity Model (ZTMM) assists ag...
2024-12-19 17:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
maturity
cloud
pillar
Foundry study highlights the benefits of a unified security platform in new e-book
Microsoft observes more than 600 million ransomware, phishing, and identity attacks each day.¹ One...
2024-12-18 17:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
unified
microsoft
exposure
Agile Business, agile security: How AI and Zero Trust work together
Traditional security approaches don’t work for AI. Generative AI technology is already transforming...
2024-12-16 17:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
generative
processes
whitepaper
Convincing a billion users to love passkeys: UX design insights from Microsoft to boost adoption and security
There’s no doubt about it: The password era is ending. Bad actors know it, which is why they’re des...
2024-12-12 17:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
passkey
passkeys
enroll
security
passwords
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine
After co-opting the tools and infrastructure of another nation-state threat actor to faci...
2024-12-11 17:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
blizzard
powershell
amadey
defender
Microsoft Defender XDR demonstrates 100% detection coverage across all cyberattack stages in the 2024 MITRE ATT&CK® Evaluations: Enterprise
Delivering industry-leading detection for a sixth consecutive yearFor the sixth year...
2024-12-11 17:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
defender
cyberattack
positives
New Microsoft Purview features help protect and govern your data in the era of AI
In today’s evolving digital landscape, safeguarding data has become a challenge for organizations o...
2024-12-10 17:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
purview
dlp
copilot
Why security leaders trust Microsoft Sentinel to modernize their SOC
Security information and event management (SIEM) solutions have long served as the indispensable ne...
2024-12-6 02:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
flexibility
cloud
siems
8 years as a Leader in the Gartner® Magic Quadrant™ for Access Management
In mid-October, we released our 2024 Microsoft Digital Defense Report, which revealed over 600 mill...
2024-12-6 01:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
security
passkeys
quadrant
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage
Based on both Microsoft Threat Intelligence’s findings and those reported by governments...
2024-12-5 01:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
blizzard
0156
microsoft
c2
defender
Explore new Microsoft Entra capabilities at Gartner® Identity & Access Management Summit 2024
Identity and network access is the foundation of modern cybersecurity, with 66% of attacks involvin...
2024-12-5 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
entra
copilot
network
Follow-up on Ignite with Ask Microsoft Anything: Microsoft Security edition
AI transformation starts with security. This was a major theme across the majority of the big news...
2024-12-3 01:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
copilot
ignite
exposure
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON
This year at CYBERWARCON, Microsoft Threat Intelligence analysts are sharing research and...
2024-11-22 19:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
north
korean
microsoft
2077
korea
Previous
4
5
6
7
8
9
10
11
Next