unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Protecting credentials against social engineering: Cyberattack Series
Our story begins with a customer whose help desk unwittingly assisted a threat actor...
2023-12-5 01:0:0 | 阅读: 15 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
cyberattack
security
cyberthreat
Forrester names Microsoft Intune a Leader in the 2023 Forrester Wave™ for Unified Endpoint Management
Maintaining a secure and optimized digital environment allows new ideas to flourish...
2023-11-29 01:0:0 | 阅读: 12 |
收藏
|
Microsoft Security Blog - www.microsoft.com
intune
microsoft
forrester
security
unified
Diamond Sleet supply chain compromise distributes a modified CyberLink installer
Microsoft Threat Intelligence has uncovered a supply chain attack by the North Korea...
2023-11-23 01:0:0 | 阅读: 18 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
malicious
cyberlink
diamond
sleet
Microsoft named a Leader in 2023 Gartner® Magic Quadrant™ for Access Management for the 7th year
Protecting identity from compromise is top of mind for security professionals as ide...
2023-11-22 01:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
security
cloud
governance
Social engineering attacks lure Indian users to install Android banking trojans
Microsoft has observed ongoing activity from mobile banking trojan campaigns targeti...
2023-11-21 12:30:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
attacker
trojan
malicious
microsoft
apk
Microsoft unveils expansion of AI for security and security for AI at Microsoft Ignite
The future of security with AIThe increasing speed, scale, and sophistication of...
2023-11-16 00:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
copilot
cloud
defender
Microsoft shares threat intelligence at CYBERWARCON 2023
At the CYBERWARCON 2023 conference, Microsoft and LinkedIn analysts are presenting s...
2023-11-9 20:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
iranian
security
volt
typhoon
Insights from Microsoft Security Copilot early adopters
To understand why customers are adopting generative AI solutions like Microsoft Secu...
2023-11-9 01:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
copilot
microsoft
generative
junior
Digital security sessions at Microsoft Ignite to prepare you for the era of AI
Thousands of security professionals will join us for Microsoft Ignite from November...
2023-11-8 01:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
president
cloud
senior
Automatic Conditional Access policies in Microsoft Entra streamline identity protection
Extending our commitment to help customers be secure by default, today we’re announc...
2023-11-7 01:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
multifactor
security
microsoft
percent
Announcing Microsoft Secure Future Initiative to advance security engineering
Today Microsoft’s Vice Chair and President Brad Smith shared insight on the global...
2023-11-2 23:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
software
Starting your journey to become quantum-safe
There’s no doubt we are living through a time of rapid technological change. Advance...
2023-11-2 00:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
encryption
pqc
security
microsoft
adoption
From classroom to cyberfront: Unlocking the potential of the next generation of cyber defenders
In a world where the digital frontier is expanding and cyberattacks are becoming mor...
2023-11-1 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
workforce
diversity
An integrated incident response solution with Microsoft and PwC
Today Microsoft Incident Response is excited to announce a new collaboration with Pw...
2023-10-27 00:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
pwc
security
quicker
Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction
Microsoft has been tracking activity related to the financially motivated threat act...
2023-10-26 00:30:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
tempest
octo
microsoft
defender
security
Top insights and best practices from the new Microsoft Data Security Index report
A whopping 74 percent of organizations recently surveyed experienced at least one da...
2023-10-26 00:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
posture
makers
seamlessly
Forrester names Microsoft a Leader in the 2023 Endpoint Security Wave™ report
We are excited to share that Microsoft has been named a Leader in The Forrester Wave...
2023-10-24 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
defender
forrester
wave
Microsoft Security Copilot Early Access Program: Harnessing generative AI to empower security teams
The era of AI brings unprecedented opportunities for us, and at the same time we are...
2023-10-20 00:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
copilot
defender
generative
Multiple North Korean threat actors exploiting the TeamCity CVE-2023-42793 vulnerability
Since early October 2023, Microsoft has observed two North Korean nation-state threa...
2023-10-19 00:30:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
sleet
diamond
defender
onyx
Expanding audit logging and retention within Microsoft Purview for increased security visibility
Since our announcement in July 2023, we have made significant efforts to enhance the...
2023-10-19 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
retention
purview
security
cloud
Previous
4
5
6
7
8
9
10
11
Next