unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption
Microsoft researchers have uncovered a vulnerability in ESXi hypervisors being exploited...
2024-7-30 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
ransomware
hypervisors
security
esx
Windows Security best practices for integrating and managing security tools
Windows is an open and flexible platform used by many of the world’s top businesses for h...
2024-7-28 06:24:3 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
fffff806
windows
csagent
ffff9405
Onyx Sleet uses array of malware to gather intelligence for North Korea
On July 25, 2024, the United States Department of Justice (DOJ) indicted an individual li...
2024-7-25 23:57:18 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
onyx
sleet
microsoft
defender
korean
Zero Trust in the Age of AI: Join our online event to learn how to strengthen your security posture
Cybercrime never sleeps and the threat actors behind it never stop evolving their tactics...
2024-7-25 00:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
entra
unified
principles
Connect with Microsoft Security at Black Hat USA 2024
Black Hat USA 2024 is packed with timely, relevant information for today’s security profe...
2024-7-18 00:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
innovation
senior
Microsoft Purview Data Governance will be generally available September 1, 2024
We are excited to announce that the new Microsoft Purview Data Governance solution will b...
2024-7-16 23:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
governance
microsoft
purview
security
fabric
Simplified Zero Trust security with the Microsoft Entra Suite and unified security operations platform, now generally available
We’re announcing new capabilities to help accelerate your transition to a Zero Trust secu...
2024-7-12 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
entra
unified
defender
Vulnerabilities in PanelView Plus devices could lead to remote code execution
Microsoft discovered and responsibly disclosed two vulnerabilities in Rockwell Automation...
2024-7-3 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cip
microsoft
rockwell
remote
Mitigating Skeleton Key, a new type of generative AI jailbreak technique
In generative AI, jailbreaks, also known as direct prompt injection attacks, are maliciou...
2024-6-27 01:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
jailbreak
skeleton
security
jailbreaks
Working with a cybersecurity committee of the board
I serve on the board of a publicly traded company. I fostered the creation of the board’s...
2024-6-27 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
committee
microsoft
mandate
How to boost your incident response readiness
Cyberthreats are evolving with alarming sophistication, making it crucial for organizatio...
2024-6-26 00:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
disaster
threats
Microsoft Defender Experts for XDR recognized in the latest MITRE Engenuity ATT&CK® Evaluation for Managed Services
Microsoft Defender Experts for XDR demonstrated excellent managed extended detection and...
2024-6-18 21:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
defender
microsoft
security
cyberattack
ransomware
Microsoft Incident Response tips for managing a mass password reset
Explore how effective incident response helps organizations detect, address, and st...
2024-6-13 00:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
mass
entra
How to achieve cloud-native endpoint management with Microsoft Intune
This is the final blog post in our series highlighting the increasing benefits of becom...
2024-6-12 23:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
intune
cloud
microsoft
mindset
copilot
AI jailbreaks: What they are and how they can be mitigated
Generative AI systems are made up of multiple components that interact to provide a rich...
2024-6-5 01:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
jailbreak
generative
jailbreaks
harmful
The four stages of creating a trust fabric with identity and network security
How implementing a trust fabric strengthens identity and networkRead the b...
2024-6-5 00:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
stage
identities
fabric
Microsoft is named a leader in the Forrester Wave for XDR
“Defenders think in lists, attackers think in graphs.”1 This remains a reality for the ma...
2024-6-4 00:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
forrester
defender
unified
Microsoft is named a leader in the Forrester Wave for XDR
“Defenders think in lists, attackers think in graphs.”1 This remains a reality for the ma...
2024-6-4 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
forrester
defender
unified
Exposed and vulnerable: Recent attacks highlight critical need to protect internet-exposed OT devices
Since late 2023, Microsoft has observed an increase in reports of attacks focusing on int...
2024-5-31 01:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
water
aliquippa
security
plc
6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security strategy
Multicloud computing has become the foundation for digital businesses, with 86% of organi...
2024-5-30 00:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
cloud
identities
multicloud
microsoft
Previous
2
3
4
5
6
7
8
9
Next