unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How Microsoft Entra ID supports US government agencies in meeting identity security requirements
If you’re in charge of cybersecurity for a United States government agency, you’re alread...
2024-8-27 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
phishing
resistant
Microsoft AI Tour: Hear the latest product innovations to elevate your security strategy
For the second year, the Microsoft AI Tour will bring together security practitioners, de...
2024-8-23 00:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
tour
cities
Microsoft again ranked number one in modern endpoint security market share
Today’s remote workforce has become the standard. But the security challenges created by...
2024-8-22 00:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
defender
ransomware
worldwide
Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE
Microsoft researchers recently identified multiple medium severity vulnerabilities in Ope...
2024-8-9 02:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
openvpn
attacker
microsoft
openvpnserv
How Microsoft and NIST are collaborating to advance the Zero Trust Implementation
We are announcing the release of the recently published Zero Trust practice guide in coll...
2024-8-7 04:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
nccoe
microsoft
security
New Microsoft whitepaper shares how to prepare your data for secure AI adoption
The era of AI brings many opportunities to companies, from boosts in productivity to gene...
2024-7-31 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
generative
copilot
whitepaper
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption
Microsoft researchers have uncovered a vulnerability in ESXi hypervisors being exploited...
2024-7-30 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
ransomware
hypervisors
security
esx
Windows Security best practices for integrating and managing security tools
Windows is an open and flexible platform used by many of the world’s top businesses for h...
2024-7-28 06:24:3 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
fffff806
windows
csagent
ffff9405
Onyx Sleet uses array of malware to gather intelligence for North Korea
On July 25, 2024, the United States Department of Justice (DOJ) indicted an individual li...
2024-7-25 23:57:18 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
onyx
sleet
microsoft
defender
korean
Zero Trust in the Age of AI: Join our online event to learn how to strengthen your security posture
Cybercrime never sleeps and the threat actors behind it never stop evolving their tactics...
2024-7-25 00:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
entra
unified
principles
Connect with Microsoft Security at Black Hat USA 2024
Black Hat USA 2024 is packed with timely, relevant information for today’s security profe...
2024-7-18 00:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
innovation
senior
Microsoft Purview Data Governance will be generally available September 1, 2024
We are excited to announce that the new Microsoft Purview Data Governance solution will b...
2024-7-16 23:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
governance
microsoft
purview
security
fabric
Simplified Zero Trust security with the Microsoft Entra Suite and unified security operations platform, now generally available
We’re announcing new capabilities to help accelerate your transition to a Zero Trust secu...
2024-7-12 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
entra
unified
defender
Vulnerabilities in PanelView Plus devices could lead to remote code execution
Microsoft discovered and responsibly disclosed two vulnerabilities in Rockwell Automation...
2024-7-3 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cip
microsoft
rockwell
remote
Mitigating Skeleton Key, a new type of generative AI jailbreak technique
In generative AI, jailbreaks, also known as direct prompt injection attacks, are maliciou...
2024-6-27 01:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
jailbreak
skeleton
security
jailbreaks
Working with a cybersecurity committee of the board
I serve on the board of a publicly traded company. I fostered the creation of the board’s...
2024-6-27 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
committee
microsoft
mandate
How to boost your incident response readiness
Cyberthreats are evolving with alarming sophistication, making it crucial for organizatio...
2024-6-26 00:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
disaster
threats
Microsoft Defender Experts for XDR recognized in the latest MITRE Engenuity ATT&CK® Evaluation for Managed Services
Microsoft Defender Experts for XDR demonstrated excellent managed extended detection and...
2024-6-18 21:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
defender
microsoft
security
cyberattack
ransomware
Microsoft Incident Response tips for managing a mass password reset
Explore how effective incident response helps organizations detect, address, and st...
2024-6-13 00:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
mass
entra
How to achieve cloud-native endpoint management with Microsoft Intune
This is the final blog post in our series highlighting the increasing benefits of becom...
2024-6-12 23:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
intune
cloud
microsoft
mindset
copilot
Previous
2
3
4
5
6
7
8
9
Next