unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks
Microsoft has identified a new North Korean threat actor, now tracked as Moonstone Sleet...
2024-5-29 00:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
sleet
moonstone
microsoft
malicious
north
Cyber Signals: Inside the growing risk of gift card fraud
In the ever-evolving landscape of cyberthreats, staying ahead of malicious actors is a co...
2024-5-23 21:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
0539
security
cloud
microsoft
New Windows 11 features strengthen security to address evolving cyberthreat landscape
Ahead of the Microsoft Build 2024 conference, we announced a new class of Windows compute...
2024-5-21 02:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
windows
security
microsoft
lsa
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware
Since mid-April 2024, Microsoft Threat Intelligence has observed the threat actor Storm-1...
2024-5-16 00:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
assist
ransomware
qakbot
defender
Microsoft is again named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management
We are pleased to announce that Microsoft has been recognized as a Leader in the Gartner®...
2024-5-14 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
unified
copilot
quadrant
How implementing a trust fabric strengthens identity and network
The identity security landscape is transforming rapidly. Every digital experience and int...
2024-5-9 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
fabric
security
microsoft
network
identities
Microsoft announces the 2024 Microsoft Security Excellence Awards winners
At this year’s Microsoft Security Excellence Awards, we took a journey through the evolut...
2024-5-8 00:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
winner
trailblazer
misa
New capabilities to help you secure your AI transformation
AI is transforming our world, unlocking new possibilities to enhance human abilities and...
2024-5-7 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
defender
copilot
purview
Security above all else—expanding Microsoft’s Secure Future Initiative
Last November, we launched the Secure Future Initiative (SFI) to prepare for the increasi...
2024-5-3 22:55:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
sfi
tenants
software
Microsoft introduces passkeys for consumer accounts
Ten years ago, Microsoft envisioned a bold future: a world free of passwords. Every year,...
2024-5-2 21:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
passwords
passkey
passkeys
security
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps
Microsoft discovered a path traversal-affiliated vulnerability pattern in multiple popula...
2024-5-2 02:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
malicious
security
microsoft
developers
remote
5 ways a CNAPP can strengthen your multicloud security environment
The cloud security market continues to evolve, reflecting the diligent efforts of securit...
2024-4-25 00:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
cloud
cnapp
microsoft
defender
New Microsoft Incident Response guide helps simplify cyberthreat investigations
There’s an increasing demand for skilled cybersecurity professionals. It’s being driven b...
2024-4-24 00:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
windows
analysis
security
microsoft
Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials
Microsoft Threat Intelligence is publishing results of our longstanding investigation int...
2024-4-23 00:0:0 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
gooseegg
blizzard
windows
forest
Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters
Attackers are constantly seeking new vulnerabilities to compromise Kubernetes environment...
2024-4-18 00:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
attackers
defender
security
New Microsoft guidance for the DoD Zero Trust Strategy
The Department of Defense (DoD) Zero Trust Strategy1 and accompanying execution roadmap2...
2024-4-17 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
dod
security
cloud
defender
Microsoft recognized as a Leader in the Forrester Wave™: Workforce Identity Platform, Q1 2024
We’re thrilled to announce that Forrester has recognized Microsoft as a Leader in the For...
2024-4-16 00:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
workforce
entra
security
forrester
How Microsoft discovers and mitigates evolving attacks against AI guardrails
As we continue to integrate generative AI into our daily lives, it’s important to underst...
2024-4-12 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
crescendo
malicious
llm
jailbreak
Explore Microsoft’s AI innovations at RSA Conference 2024
The security of your organization directly correlates with your ability to transform and...
2024-4-5 00:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
misa
booth
Get end-to-end protection with Microsoft’s unified security operations platform, now in public preview
Today, I am excited to announce the public preview of our unified security operations pla...
2024-4-4 00:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
unified
defender
exposure
Previous
3
4
5
6
7
8
9
10
Next