unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Microsoft Entra Verified ID introduces Face Check in preview
Today, I’m thrilled to announce the expansion of Microsoft Entra Verified ID to include F...
2024-2-7 01:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
security
assurance
idemia
Connect with Microsoft at these cybersecurity events in 2024
In the cybersecurity industry, there are many events to choose from. You as a cybersecuri...
2024-2-2 02:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
leaders
ignite
3 new ways the Microsoft Intune Suite offers security, simplification, and savings
Today, we are taking a significant step in completing the delivery of functionality we...
2024-2-2 01:0:0 | 阅读: 11 |
收藏
|
Microsoft Security Blog - www.microsoft.com
intune
microsoft
cloud
security
forrester
Join us at InfoSec Jupyterthon 2024
Jupyter notebooks are continuing to grow in popularity in information security as an alte...
2024-1-30 02:0:0 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
notebooks
security
jupyterthon
jupyter
Best practices in moving to cloud native endpoint management
This blog is the second of three that details our recommendation to adopt cloud native...
2024-1-30 01:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cloud
workloads
windows
intune
microsoft
Midnight Blizzard: Guidance for responders on nation-state attack
The Microsoft security team detected a nation-state attack on our corporate systems on Ja...
2024-1-26 08:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
blizzard
midnight
exchange
malicious
How Datawiza uses Microsoft Entra ID to help universities simplify access
This blog post is part of the Microsoft Intelligent Security Association guest blog serie...
2024-1-25 01:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
datawiza
peoplesoft
security
entra
Microsoft at Legalweek: Secure data and gain efficiencies with Microsoft Purview eDiscovery enhanced by generative AI
The legal profession is known for being cautious or hesitant to adopt new technologies. H...
2024-1-19 01:0:0 | 阅读: 21 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
ediscovery
purview
legalweek
security
New Microsoft Incident Response guides help security teams analyze suspicious activity
Today Microsoft Incident Response are proud to introduce two one-page guides to help secu...
2024-1-18 02:0:0 | 阅读: 14 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
security
guides
powershell
New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs
Since November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHOR...
2024-1-18 01:0:0 | 阅读: 25 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
mint
sandstorm
malicious
mediapl
Unified security operations with Microsoft Sentinel and Microsoft Defender XDR
Numerous cybersecurity tools exist to help organizations protect their data, people, and...
2024-1-17 01:0:0 | 阅读: 11 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
unified
generative
copilot
Microsoft is named a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
It’s no secret that ransomware is top of mind for many chief information security of...
2024-1-13 01:0:0 | 阅读: 15 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
defender
disruption
threats
5 ways to secure identity and access for 2024
The security landscape is changing fast. In 2023, we saw a record-high 30 billion at...
2024-1-11 01:0:0 | 阅读: 20 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
identities
entra
multicloud
Financially motivated threat actors misusing App Installer
Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, i...
2023-12-29 02:0:0 | 阅读: 18 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
malicious
landing
defender
tempest
How Strata Identity and Microsoft Entra ID solve identity challenges in mergers and acquisitions
This blog post is part of the Microsoft Intelligent Security Association guest blog...
2023-12-20 01:0:0 | 阅读: 13 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
strata
maverics
security
entra
Patching Perforce perforations: Critical RCE vulnerability discovered in Perforce Helix Core Server
Microsoft discovered, responsibly disclosed, and helped remediate four vulnerabiliti...
2023-12-16 01:0:0 | 阅读: 13 |
收藏
|
Microsoft Security Blog - www.microsoft.com
perforce
p4api
2468153
vsdebug
openssl1
Threat actors misuse OAuth applications to automate financially driven attacks
Threat actors are misusing OAuth applications as an automation tool in financially m...
2023-12-13 02:0:0 | 阅读: 23 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
defender
phishing
malicious
New Microsoft Incident Response team guide shares best practices for security teams and leaders
As enterprise networks grow in both size and complexity, securing them from motivate...
2023-12-12 01:0:0 | 阅读: 12 |
收藏
|
Microsoft Security Blog - www.microsoft.com
processes
microsoft
security
New Microsoft Purview features use AI to help secure and govern all your data
In the past few years, we have witnessed how digital and cloud transformation has ac...
2023-12-8 01:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
purview
security
copilot
estate
Star Blizzard increases sophistication and evasion in ongoing attacks
Microsoft Threat Intelligence continues to track and disrupt malicious activity attributed to a Russ...
2023-12-7 20:1:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
com2023
incc
blizzard
microsoft
44namecheap
Previous
5
6
7
8
9
10
11
12
Next