unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Microsoft Security Copilot drives new product integrations at Microsoft Ignite to empower security and IT teams
First announced in March 2023, Microsoft Security Copilot—Microsoft’s first generati...
2023-12-7 01:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
copilot
microsoft
defender
cloud
Microsoft Incident Response lessons on preventing cloud identity compromise
Microsoft observed a surge in cyberattacks targeting identities in 2023, with attemp...
2023-12-6 01:0:0 | 阅读: 16 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
privileged
security
phishing
3 reasons why now is the time to go cloud native for device management
Since the start of Microsoft Intune in 2010, we have been working on and iterating toward sim...
2023-12-6 00:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cloud
windows
microsoft
security
hpe
Protecting credentials against social engineering: Cyberattack Series
Our story begins with a customer whose help desk unwittingly assisted a threat actor...
2023-12-5 01:0:0 | 阅读: 15 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
cyberattack
security
cyberthreat
Forrester names Microsoft Intune a Leader in the 2023 Forrester Wave™ for Unified Endpoint Management
Maintaining a secure and optimized digital environment allows new ideas to flourish...
2023-11-29 01:0:0 | 阅读: 12 |
收藏
|
Microsoft Security Blog - www.microsoft.com
intune
microsoft
forrester
security
unified
Diamond Sleet supply chain compromise distributes a modified CyberLink installer
Microsoft Threat Intelligence has uncovered a supply chain attack by the North Korea...
2023-11-23 01:0:0 | 阅读: 18 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
malicious
cyberlink
diamond
sleet
Microsoft named a Leader in 2023 Gartner® Magic Quadrant™ for Access Management for the 7th year
Protecting identity from compromise is top of mind for security professionals as ide...
2023-11-22 01:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
security
cloud
governance
Social engineering attacks lure Indian users to install Android banking trojans
Microsoft has observed ongoing activity from mobile banking trojan campaigns targeti...
2023-11-21 12:30:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
attacker
trojan
malicious
microsoft
apk
Microsoft unveils expansion of AI for security and security for AI at Microsoft Ignite
The future of security with AIThe increasing speed, scale, and sophistication of...
2023-11-16 00:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
copilot
cloud
defender
Microsoft shares threat intelligence at CYBERWARCON 2023
At the CYBERWARCON 2023 conference, Microsoft and LinkedIn analysts are presenting s...
2023-11-9 20:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
iranian
security
volt
typhoon
Insights from Microsoft Security Copilot early adopters
To understand why customers are adopting generative AI solutions like Microsoft Secu...
2023-11-9 01:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
copilot
microsoft
generative
junior
Digital security sessions at Microsoft Ignite to prepare you for the era of AI
Thousands of security professionals will join us for Microsoft Ignite from November...
2023-11-8 01:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
president
cloud
senior
Automatic Conditional Access policies in Microsoft Entra streamline identity protection
Extending our commitment to help customers be secure by default, today we’re announc...
2023-11-7 01:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
multifactor
security
microsoft
percent
Announcing Microsoft Secure Future Initiative to advance security engineering
Today Microsoft’s Vice Chair and President Brad Smith shared insight on the global...
2023-11-2 23:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
software
Starting your journey to become quantum-safe
There’s no doubt we are living through a time of rapid technological change. Advance...
2023-11-2 00:0:0 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
encryption
pqc
security
microsoft
adoption
From classroom to cyberfront: Unlocking the potential of the next generation of cyber defenders
In a world where the digital frontier is expanding and cyberattacks are becoming mor...
2023-11-1 00:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
workforce
diversity
An integrated incident response solution with Microsoft and PwC
Today Microsoft Incident Response is excited to announce a new collaboration with Pw...
2023-10-27 00:0:0 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
pwc
security
quicker
Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction
Microsoft has been tracking activity related to the financially motivated threat act...
2023-10-26 00:30:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
tempest
octo
microsoft
defender
security
Top insights and best practices from the new Microsoft Data Security Index report
A whopping 74 percent of organizations recently surveyed experienced at least one da...
2023-10-26 00:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
posture
makers
seamlessly
Forrester names Microsoft a Leader in the 2023 Endpoint Security Wave™ report
We are excited to share that Microsoft has been named a Leader in The Forrester Wave...
2023-10-24 00:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
defender
forrester
wave
Previous
6
7
8
9
10
11
12
13
Next