unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Explore new Microsoft Entra capabilities at Gartner® Identity & Access Management Summit 2024
Identity and network access is the foundation of modern cybersecurity, with 66% of attacks involvin...
2024-12-5 00:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
entra
copilot
network
Follow-up on Ignite with Ask Microsoft Anything: Microsoft Security edition
AI transformation starts with security. This was a major theme across the majority of the big news...
2024-12-3 01:0:0 | 阅读: 11 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
copilot
ignite
exposure
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON
This year at CYBERWARCON, Microsoft Threat Intelligence analysts are sharing research and...
2024-11-22 19:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
north
korean
microsoft
2077
korea
AI innovations for a more secure future unveiled at Microsoft Ignite
In today’s rapidly changing cyberthreat landscape, influenced by global events and AI advancements,...
2024-11-19 21:30:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
copilot
purview
cloud
Microsoft Data Security Index annual report highlights evolving generative AI security needs
Generative AI presents companies of all sizes with opportunities to increase efficiency and drive i...
2024-11-14 01:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
generative
adoption
microsoft
increases
DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration
In 2022, the United States Department of Defense (DoD) released its formal Zero Trust (ZT) Strategy...
2024-11-12 01:0:0 | 阅读: 13 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
navy
dod
zt
More value, less risk: How to implement generative AI across the organization securely and responsibly
The technology landscape is undergoing a massive transformation, and AI is at the center...
2024-11-8 01:0:0 | 阅读: 12 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
generative
addressing
biases
regulatory
Zero Trust Workshop: Advance your knowledge with an online resource
Microsoft is on the front lines helping secure customers worldwide—analyzing and responding to cybe...
2024-11-7 01:0:0 | 阅读: 14 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
workshop
microsoft
pillar
pillars
How Microsoft Defender for Office 365 innovated to address QR code phishing attacks
Over the last year, the cybersecurity industry faced a significant surge in QR code phishing campai...
2024-11-5 01:0:0 | 阅读: 14 |
收藏
|
Microsoft Security Blog - www.microsoft.com
qr
phishing
security
microsoft
defender
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network
Since August 2023, Microsoft has observed intrusion activity targeting and successfully s...
2024-11-1 01:0:0 | 阅读: 12 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
1658
0940
network
7 cybersecurity trends and tips for small and medium businesses to stay protected
As October draws to a close, marking 21 years of Cybersecurity Awareness Month, cyberattacks contin...
2024-11-1 00:0:0 | 阅读: 11 |
收藏
|
Microsoft Security Blog - www.microsoft.com
smbs
security
cyberattack
Microsoft Ignite: Sessions and demos to improve your security strategy
Now more than ever is the time for every organization to prioritize security. The use of AI by cybe...
2024-10-31 00:0:0 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
ignite
copilot
Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files
read file error: read notes: is a directory...
2024-10-30 03:0:0 | 阅读: 14 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cloudeu
west
microsoft
mil
cloudus
Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action
Healthcare organizations are an increasingly attractive target for threat actors. In a new Microsof...
2024-10-23 00:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
healthcare
ransomware
security
microsoft
New macOS vulnerability, “HM Surf”, could lead to unauthorized data access
Microsoft Threat Intelligence uncovered a macOS vulnerability that could potentially allo...
2024-10-18 00:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
surf
microphone
security
hm
Microsoft’s guidance to help mitigate Kerberoasting
As cyberthreats continue to evolve, it’s essential for security professionals to stay inf...
2024-10-12 01:0:0 | 阅读: 11 |
收藏
|
Microsoft Security Blog - www.microsoft.com
encryption
microsoft
passwords
security
Cyber Signals Issue 8 | Education under siege: How cybercriminals target our schools
read file error: read notes: is a directory...
2024-10-10 19:0:0 | 阅读: 13 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
qr
phishing
File hosting services misused for identity phishing | Microsoft Security Blog
Microsoft has observed campaigns misusing legitimate file hosting services increasingly u...
2024-10-9 17:16:57 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - www.microsoft.com
microsoft
dropbox
phishing
defender
fileshared
Microsoft Defender for Cloud remediated threats 30% faster than other solutions, according to Forrester TEI™ study
The broad adoption of multicloud and hybrid infrastructures has introduced new complexity to the cl...
2024-10-8 00:0:0 | 阅读: 11 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cloud
security
defender
microsoft
Cybersecurity Awareness Month: Securing our world—together
As Cybersecurity Awareness Month marks its 21st year, it’s clear that this year stands out. Phishin...
2024-10-2 00:0:0 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
phishing
era
Previous
8
9
10
11
12
13
14
15
Next