unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Microsoft Security Copilot Early Access Program: Harnessing generative AI to empower security teams
The era of AI brings unprecedented opportunities for us, and at the same time we are...
2023-10-20 00:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
copilot
defender
generative
Multiple North Korean threat actors exploiting the TeamCity CVE-2023-42793 vulnerability
Since early October 2023, Microsoft has observed two North Korean nation-state threa...
2023-10-19 00:30:0 | 阅读: 18 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
sleet
diamond
defender
onyx
Expanding audit logging and retention within Microsoft Purview for increased security visibility
Since our announcement in July 2023, we have made significant efforts to enhance the...
2023-10-19 00:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
retention
purview
security
cloud
Microsoft Defender for Endpoint now stops human-operated attacks on its own
Defenders need every edge they can get in the fight against ransomware. Today, we’re...
2023-10-12 00:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
disruption
security
microsoft
ransomware
defender
Automatic disruption of human-operated attacks through containment of compromised user accounts
Our experience and insights from real-world incidents tell us that the swift contain...
2023-10-12 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
attackers
defender
microsoft
onboarded
disruption
Expanded Microsoft Security Experts offerings provide comprehensive protection
Since we first introduced Microsoft Security Experts in May 2022, we’ve worked hard...
2023-10-10 00:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
defender
proactive
Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement
Microsoft security researchers recently identified a campaign where attackers attemp...
2023-10-4 00:30:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cloud
attackers
microsoft
identities
lateral
Celebrate 20 years of Cybersecurity Awareness Month with Microsoft and let’s secure our world together
This year marks the twentieth anniversary of Cybersecurity Awareness Month, when we...
2023-10-3 00:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
phishing
multifactor
Join the new Microsoft Security experience at Microsoft Ignite 2023
During the past few years, we’ve managed a lot of change and disruption in our secur...
2023-9-29 00:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
ignite
breakout
leaders
New security features in Windows 11 protect users and empower IT
While attacks are getting more sophisticated, so are our defenses. With recent innov...
2023-9-27 01:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
windows
security
microsoft
passkeys
New Microsoft security tools to protect families and businesses
Today marks an exciting milestone in Microsoft’s AI journey. This morning, at an eve...
2023-9-21 23:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
windows
passkeys
defender
Microsoft 365 Defender demonstrates 100 percent protection coverage in the 2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise
For the fifth consecutive year, Microsoft 365 Defender demonstrated industry-leading...
2023-9-20 21:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
defender
engenuity
evaluations
Forrester names Microsoft a Leader in the 2023 Zero Trust Platform Providers Wave™ report
Microsoft is proud to be recognized as a Leader in the Forrester Wave™: Zero Trust P...
2023-9-20 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
forrester
security
microsoft
wave
threats
Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets
Since February 2023, Microsoft has observed password spray activity against thousand...
2023-9-15 00:30:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
sandstorm
peach
microsoft
entra
Uncursing the ncurses: Memory corruption vulnerabilities found in library
Microsoft has discovered a set of memory corruption vulnerabilities in a library cal...
2023-9-14 19:30:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
terminfo
ncurses
security
microsoft
Malware distributor Storm-0324 facilitates ransomware access
The threat actor that Microsoft tracks as Storm-0324 is a financially motivated grou...
2023-9-13 01:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
0324
ransomware
phishing
defender
Cloud storage security: What’s new in the threat matrix
Today, we announce the release of a second version of the threat matrix for storage...
2023-9-8 01:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
attackers
cloud
replication
sftp
victim
Navigating privacy in a data-driven world with Microsoft Priva
Data protection and privacy have become business imperatives. In a global survey con...
2023-9-1 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
priva
microsoft
regulations
security
Flax Typhoon using legitimate software to quietly access Taiwanese organizations
SummaryMicrosoft has identified a nation-state activity group tracked as Flax T...
2023-8-25 00:30:0 | 阅读: 13 |
收藏
|
Microsoft Security Blog - www.microsoft.com
typhoon
flax
network
microsoft
windows
How the Microsoft Incident Response team helps customers remediate threats
Each year, organizations face tens of billions of malware, phishing, and credential...
2023-8-16 00:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
defender
ransomware
monitoring
Previous
7
8
9
10
11
12
13
14
Next