unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Join us at InfoSec Jupyterthon 2024
Jupyter notebooks are continuing to grow in popularity in information security as an alte...
2024-1-30 02:0:0 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
notebooks
security
jupyterthon
jupyter
Best practices in moving to cloud native endpoint management
This blog is the second of three that details our recommendation to adopt cloud native...
2024-1-30 01:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cloud
workloads
windows
intune
microsoft
Midnight Blizzard: Guidance for responders on nation-state attack
The Microsoft security team detected a nation-state attack on our corporate systems on Ja...
2024-1-26 08:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
blizzard
midnight
exchange
malicious
How Datawiza uses Microsoft Entra ID to help universities simplify access
This blog post is part of the Microsoft Intelligent Security Association guest blog serie...
2024-1-25 01:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
datawiza
peoplesoft
security
entra
Microsoft at Legalweek: Secure data and gain efficiencies with Microsoft Purview eDiscovery enhanced by generative AI
The legal profession is known for being cautious or hesitant to adopt new technologies. H...
2024-1-19 01:0:0 | 阅读: 21 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
ediscovery
purview
legalweek
security
New Microsoft Incident Response guides help security teams analyze suspicious activity
Today Microsoft Incident Response are proud to introduce two one-page guides to help secu...
2024-1-18 02:0:0 | 阅读: 14 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
security
guides
powershell
New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs
Since November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHOR...
2024-1-18 01:0:0 | 阅读: 25 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
mint
sandstorm
malicious
mediapl
Unified security operations with Microsoft Sentinel and Microsoft Defender XDR
Numerous cybersecurity tools exist to help organizations protect their data, people, and...
2024-1-17 01:0:0 | 阅读: 11 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
unified
generative
copilot
Microsoft is named a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
It’s no secret that ransomware is top of mind for many chief information security of...
2024-1-13 01:0:0 | 阅读: 15 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
defender
disruption
threats
5 ways to secure identity and access for 2024
The security landscape is changing fast. In 2023, we saw a record-high 30 billion at...
2024-1-11 01:0:0 | 阅读: 20 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
identities
entra
multicloud
Financially motivated threat actors misusing App Installer
Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, i...
2023-12-29 02:0:0 | 阅读: 18 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
malicious
landing
defender
tempest
How Strata Identity and Microsoft Entra ID solve identity challenges in mergers and acquisitions
This blog post is part of the Microsoft Intelligent Security Association guest blog...
2023-12-20 01:0:0 | 阅读: 13 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
strata
maverics
security
entra
Patching Perforce perforations: Critical RCE vulnerability discovered in Perforce Helix Core Server
Microsoft discovered, responsibly disclosed, and helped remediate four vulnerabiliti...
2023-12-16 01:0:0 | 阅读: 13 |
收藏
|
Microsoft Security Blog - www.microsoft.com
perforce
p4api
2468153
vsdebug
openssl1
Threat actors misuse OAuth applications to automate financially driven attacks
Threat actors are misusing OAuth applications as an automation tool in financially m...
2023-12-13 02:0:0 | 阅读: 22 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
defender
phishing
malicious
New Microsoft Incident Response team guide shares best practices for security teams and leaders
As enterprise networks grow in both size and complexity, securing them from motivate...
2023-12-12 01:0:0 | 阅读: 11 |
收藏
|
Microsoft Security Blog - www.microsoft.com
processes
microsoft
security
New Microsoft Purview features use AI to help secure and govern all your data
In the past few years, we have witnessed how digital and cloud transformation has ac...
2023-12-8 01:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
purview
security
copilot
estate
Star Blizzard increases sophistication and evasion in ongoing attacks
Microsoft Threat Intelligence continues to track and disrupt malicious activity attributed to a Russ...
2023-12-7 20:1:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
com2023
incc
blizzard
microsoft
44namecheap
Microsoft Security Copilot drives new product integrations at Microsoft Ignite to empower security and IT teams
First announced in March 2023, Microsoft Security Copilot—Microsoft’s first generati...
2023-12-7 01:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
copilot
microsoft
defender
cloud
Microsoft Incident Response lessons on preventing cloud identity compromise
Microsoft observed a surge in cyberattacks targeting identities in 2023, with attemp...
2023-12-6 01:0:0 | 阅读: 16 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
privileged
security
phishing
3 reasons why now is the time to go cloud native for device management
Since the start of Microsoft Intune in 2010, we have been working on and iterating toward sim...
2023-12-6 00:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cloud
windows
microsoft
security
hpe
Previous
3
4
5
6
7
8
9
10
Next