unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Securing DeepSeek and other AI systems with Microsoft Security
微软提供一系列安全解决方案,帮助组织保护和治理AI应用程序的安全性与合规性。通过Azure AI Foundry和GitHub平台,微软确保DeepSeek R1模型的安全性,并提供威胁防护、数据安全、合规管理和治理功能。同时,微软还支持监控和控制第三方AI应用的使用,防止潜在风险。...
2025-2-13 17:0:0 | 阅读: 24 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
deepseek
defender
cloud
The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation
微软报告了一个俄罗斯网络攻击组织Seashell Blizzard的子集团(BadPilot活动),该子集团利用公开漏洞和机会主义技术对全球关键基础设施进行攻击,包括能源、通信、航运和政府等领域,并在乌克兰和其他地区展开活动。...
2025-2-12 17:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
blizzard
microsoft
seashell
subgroup
defender
Build a stronger security strategy with proactive and reactive incident response: Cyberattack Series
文章指出网络犯罪造成的经济损失巨大,并强调了准备应对潜在网络攻击的重要性。微软事件响应团队通过主动威胁狩猎和妥协评估帮助组织提升安全态势,并在实际案例中展示了其快速应对和遏制威胁的能力。...
2025-2-10 17:0:0 | 阅读: 14 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
proactive
reactive
security
cyberattack
Code injection attacks using publicly disclosed ASP.NET machine keys
这篇文章讨论了ViewState代码注入攻击,利用公开的ASP.NET机器密钥进行恶意代码注入。微软发现超过3000个公开密钥可能被用于此类攻击,并建议定期轮换密钥以减少风险。...
2025-2-6 18:0:0 | 阅读: 25 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
machine
security
viewstate
defender
Hear from Microsoft Security experts at these top cybersecurity events in 2025
Inspiration can spark in an instant when you’re at a conference. Perhaps you discover a new tool du...
2025-2-3 17:0:0 | 阅读: 14 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
dates
3 priorities for adopting proactive identity and access security in 2025
If 2024 taught us anything, it’s that a proactive, no-compromises approach to security is essential...
2025-1-28 17:0:0 | 阅读: 14 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
entra
identities
Fast-track generative AI security with Microsoft Purview
As a data security global black belt, I help organizations secure AI solutions. They are concerned...
2025-1-27 17:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
purview
security
generative
New Star Blizzard spear-phishing campaign targets WhatsApp accounts
In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we...
2025-1-16 17:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
blizzard
phishing
defender
domainlist
Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions
Microsoft Threat Intelligence discovered a new macOS vulnerability that could allow attac...
2025-1-13 17:0:0 | 阅读: 17 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
processes
bypass
3 takeaways from red teaming 100 generative AI products
Microsoft’s AI red team is excited to share our whitepaper, “Lessons from Red Teaming 100 Generativ...
2025-1-13 16:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
teaming
security
generative
whitepaper
microsoft
Why security teams rely on Microsoft Defender Experts for XDR for managed detection and response
The expanding attack surface is creating more opportunities for exploitation and adding to the pres...
2025-1-6 17:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
defender
phishing
New Microsoft guidance for the CISA Zero Trust Maturity Model
The Cybersecurity Infrastructure Security Agency (CISA) Zero Trust Maturity Model (ZTMM) assists ag...
2024-12-19 17:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
maturity
cloud
pillar
Foundry study highlights the benefits of a unified security platform in new e-book
Microsoft observes more than 600 million ransomware, phishing, and identity attacks each day.¹ One...
2024-12-18 17:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
unified
microsoft
exposure
Agile Business, agile security: How AI and Zero Trust work together
Traditional security approaches don’t work for AI. Generative AI technology is already transforming...
2024-12-16 17:0:0 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
generative
processes
whitepaper
Convincing a billion users to love passkeys: UX design insights from Microsoft to boost adoption and security
There’s no doubt about it: The password era is ending. Bad actors know it, which is why they’re des...
2024-12-12 17:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
passkey
passkeys
enroll
security
passwords
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine
After co-opting the tools and infrastructure of another nation-state threat actor to faci...
2024-12-11 17:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
blizzard
powershell
amadey
defender
Microsoft Defender XDR demonstrates 100% detection coverage across all cyberattack stages in the 2024 MITRE ATT&CK® Evaluations: Enterprise
Delivering industry-leading detection for a sixth consecutive yearFor the sixth year...
2024-12-11 17:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
defender
cyberattack
positives
New Microsoft Purview features help protect and govern your data in the era of AI
In today’s evolving digital landscape, safeguarding data has become a challenge for organizations o...
2024-12-10 17:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
purview
dlp
copilot
Why security leaders trust Microsoft Sentinel to modernize their SOC
Security information and event management (SIEM) solutions have long served as the indispensable ne...
2024-12-6 02:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
flexibility
cloud
siems
8 years as a Leader in the Gartner® Magic Quadrant™ for Access Management
In mid-October, we released our 2024 Microsoft Digital Defense Report, which revealed over 600 mill...
2024-12-6 01:0:0 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
security
passkeys
quadrant
Previous
7
8
9
10
11
12
13
14
Next