unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files
Since October 22, 2024, Microsoft Threat Intelligence has observed Russian threat actor M...
2024-10-30 03:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cloudeu
west
microsoft
mil
cloudus
Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action
Healthcare organizations are an increasingly attractive target for threat actors. In a new Microsof...
2024-10-23 00:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
healthcare
ransomware
security
microsoft
New macOS vulnerability, “HM Surf”, could lead to unauthorized data access
Microsoft Threat Intelligence uncovered a macOS vulnerability that could potentially allo...
2024-10-18 00:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
surf
microphone
security
hm
Microsoft’s guidance to help mitigate Kerberoasting
As cyberthreats continue to evolve, it’s essential for security professionals to stay inf...
2024-10-12 01:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
encryption
microsoft
passwords
security
Cyber Signals Issue 8 | Education under siege: How cybercriminals target our schools
Introduction | Security snapshot | Threat briefingDefending against attacks | Expert profile Ed...
2024-10-10 19:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
qr
phishing
File hosting services misused for identity phishing | Microsoft Security Blog
Microsoft has observed campaigns misusing legitimate file hosting services increasingly u...
2024-10-9 17:16:57 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.microsoft.com
microsoft
dropbox
phishing
defender
fileshared
Microsoft Defender for Cloud remediated threats 30% faster than other solutions, according to Forrester TEI™ study
The broad adoption of multicloud and hybrid infrastructures has introduced new complexity to the cl...
2024-10-8 00:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cloud
security
defender
microsoft
Cybersecurity Awareness Month: Securing our world—together
As Cybersecurity Awareness Month marks its 21st year, it’s clear that this year stands out. Phishin...
2024-10-2 00:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
phishing
era
Storm-0501: Ransomware attacks expanding to hybrid cloud environments
Microsoft has observed the threat actor tracked as Storm-0501 launching a multi-staged at...
2024-9-27 01:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
cloud
premises
ransomware
Microsoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
Since 2023, Microsoft has seen a 2.75 times increase in the number of organizations encountering ra...
2024-9-26 03:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
defender
ransomware
copilot
Activate your data responsibly in the era of AI with Microsoft Purview
This week, teams across Microsoft Fabric and Microsoft Purview are gathered in Stockholm, Sweden, f...
2024-9-26 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
purview
fabric
security
governance
Securing our future: September 2024 progress update on Microsoft’s Secure Future Initiative (SFI)
In November 2023, we introduced the Secure Future Initiative (SFI) to advance cybersecuri...
2024-9-23 23:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
sfi
tenants
Join us at Microsoft Ignite 2024 and learn to build a security-first culture with AI
For security professionals and teams, AI offers a significant advantage, empowering organizations o...
2024-9-20 00:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
ignite
leaders
govern
How comprehensive security simplifies the defense of your digital estate
Cybersecurity jobs are more challenging than ever. It’s not just increased speed, scale, and sophis...
2024-9-19 00:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
evolving
North Korean threat actor Citrine Sleet exploiting Chromium zero-day
On August 19, 2024, Microsoft identified a North Korean threat actor exploiting a zero-da...
2024-8-31 00:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
sleet
domainlist
citrine
defender
The art and science behind Microsoft threat hunting: Part 3
Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined...
2024-8-29 03:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
hunt
hunters
informed
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations
Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peac...
2024-8-28 23:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
sandstorm
peach
defender
How Microsoft Entra ID supports US government agencies in meeting identity security requirements
If you’re in charge of cybersecurity for a United States government agency, you’re alread...
2024-8-27 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
phishing
resistant
Microsoft AI Tour: Hear the latest product innovations to elevate your security strategy
For the second year, the Microsoft AI Tour will bring together security practitioners, de...
2024-8-23 00:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
tour
cities
Microsoft again ranked number one in modern endpoint security market share
Today’s remote workforce has become the standard. But the security challenges created by...
2024-8-22 00:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
defender
ransomware
worldwide
Previous
-143
-142
-141
-140
-139
-138
-137
-136
Next