unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
AI jailbreaks: What they are and how they can be mitigated
Generative AI systems are made up of multiple components that interact to provide a rich...
2024-6-5 01:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
jailbreak
generative
jailbreaks
harmful
The four stages of creating a trust fabric with identity and network security
How implementing a trust fabric strengthens identity and networkRead the b...
2024-6-5 00:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
stage
identities
fabric
Microsoft is named a leader in the Forrester Wave for XDR
“Defenders think in lists, attackers think in graphs.”1 This remains a reality for the ma...
2024-6-4 00:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
forrester
defender
unified
Microsoft is named a leader in the Forrester Wave for XDR
“Defenders think in lists, attackers think in graphs.”1 This remains a reality for the ma...
2024-6-4 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
forrester
defender
unified
Exposed and vulnerable: Recent attacks highlight critical need to protect internet-exposed OT devices
Since late 2023, Microsoft has observed an increase in reports of attacks focusing on int...
2024-5-31 01:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
water
aliquippa
security
plc
6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security strategy
Multicloud computing has become the foundation for digital businesses, with 86% of organi...
2024-5-30 00:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
cloud
identities
multicloud
microsoft
Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks
Microsoft has identified a new North Korean threat actor, now tracked as Moonstone Sleet...
2024-5-29 00:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
sleet
moonstone
microsoft
malicious
north
Cyber Signals: Inside the growing risk of gift card fraud
In the ever-evolving landscape of cyberthreats, staying ahead of malicious actors is a co...
2024-5-23 21:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
0539
security
cloud
microsoft
New Windows 11 features strengthen security to address evolving cyberthreat landscape
Ahead of the Microsoft Build 2024 conference, we announced a new class of Windows compute...
2024-5-21 02:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
windows
security
microsoft
lsa
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware
Since mid-April 2024, Microsoft Threat Intelligence has observed the threat actor Storm-1...
2024-5-16 00:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
assist
ransomware
qakbot
defender
Microsoft is again named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management
We are pleased to announce that Microsoft has been recognized as a Leader in the Gartner®...
2024-5-14 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
unified
copilot
quadrant
How implementing a trust fabric strengthens identity and network
The identity security landscape is transforming rapidly. Every digital experience and int...
2024-5-9 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
fabric
security
microsoft
network
identities
Microsoft announces the 2024 Microsoft Security Excellence Awards winners
At this year’s Microsoft Security Excellence Awards, we took a journey through the evolut...
2024-5-8 00:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
winner
trailblazer
misa
New capabilities to help you secure your AI transformation
AI is transforming our world, unlocking new possibilities to enhance human abilities and...
2024-5-7 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
defender
copilot
purview
Security above all else—expanding Microsoft’s Secure Future Initiative
Last November, we launched the Secure Future Initiative (SFI) to prepare for the increasi...
2024-5-3 22:55:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
sfi
tenants
software
Microsoft introduces passkeys for consumer accounts
Ten years ago, Microsoft envisioned a bold future: a world free of passwords. Every year,...
2024-5-2 21:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
passwords
passkey
passkeys
security
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps
Microsoft discovered a path traversal-affiliated vulnerability pattern in multiple popula...
2024-5-2 02:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
malicious
security
microsoft
developers
remote
5 ways a CNAPP can strengthen your multicloud security environment
The cloud security market continues to evolve, reflecting the diligent efforts of securit...
2024-4-25 00:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
cloud
cnapp
microsoft
defender
New Microsoft Incident Response guide helps simplify cyberthreat investigations
There’s an increasing demand for skilled cybersecurity professionals. It’s being driven b...
2024-4-24 00:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
windows
analysis
security
microsoft
Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials
Microsoft Threat Intelligence is publishing results of our longstanding investigation int...
2024-4-23 00:0:0 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
gooseegg
blizzard
windows
forest
Previous
3
4
5
6
7
8
9
10
Next