unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Announcing Microsoft’s open automation framework to red team generative AI Systems
Today we are releasing an open automation framework, PyRIT (Python Risk Identification To...
2024-2-23 01:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
pyrit
generative
teaming
security
microsoft
Get the most out of Microsoft Copilot for Security with good prompt engineering
The process of writing, refining, and optimizing inputs—or “prompts”—to encourage generat...
2024-2-22 01:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
prompts
copilot
generative
promptbook
Navigating NIS2 requirements with Microsoft Security solutions
The Network and Information Security Directive 2 (NIS2) is a continuation and expansion o...
2024-2-21 01:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
nis2
microsoft
cloud
Staying ahead of threat actors in the age of AI
Over the last year, the speed, scale, and sophistication of attacks has increased alongsi...
2024-2-14 20:0:0 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
llms
llm
microsoft
openai
typhoon
Cyber Signals: Navigating cyberthreats and strengthening defenses in the era of AI
The world of cybersecurity is undergoing a massive transformation. AI is at the forefront...
2024-2-14 20:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
llms
machine
Microsoft Copilot for Security provides immediate impact for the Microsoft Defender Experts team
Organizations everywhere are on a lightning-fast learning trajectory to understand the po...
2024-2-9 01:0:0 | 阅读: 14 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
copilot
microsoft
defender
leadership
Microsoft Entra Verified ID introduces Face Check in preview
Today, I’m thrilled to announce the expansion of Microsoft Entra Verified ID to include F...
2024-2-7 01:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
security
assurance
idemia
Connect with Microsoft at these cybersecurity events in 2024
In the cybersecurity industry, there are many events to choose from. You as a cybersecuri...
2024-2-2 02:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
leaders
ignite
3 new ways the Microsoft Intune Suite offers security, simplification, and savings
Today, we are taking a significant step in completing the delivery of functionality we...
2024-2-2 01:0:0 | 阅读: 11 |
收藏
|
Microsoft Security Blog - www.microsoft.com
intune
microsoft
cloud
security
forrester
Join us at InfoSec Jupyterthon 2024
Jupyter notebooks are continuing to grow in popularity in information security as an alte...
2024-1-30 02:0:0 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
notebooks
security
jupyterthon
jupyter
Best practices in moving to cloud native endpoint management
This blog is the second of three that details our recommendation to adopt cloud native...
2024-1-30 01:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cloud
workloads
windows
intune
microsoft
Midnight Blizzard: Guidance for responders on nation-state attack
The Microsoft security team detected a nation-state attack on our corporate systems on Ja...
2024-1-26 08:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
blizzard
midnight
exchange
malicious
How Datawiza uses Microsoft Entra ID to help universities simplify access
This blog post is part of the Microsoft Intelligent Security Association guest blog serie...
2024-1-25 01:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
datawiza
peoplesoft
security
entra
Microsoft at Legalweek: Secure data and gain efficiencies with Microsoft Purview eDiscovery enhanced by generative AI
The legal profession is known for being cautious or hesitant to adopt new technologies. H...
2024-1-19 01:0:0 | 阅读: 21 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
ediscovery
purview
legalweek
security
New Microsoft Incident Response guides help security teams analyze suspicious activity
Today Microsoft Incident Response are proud to introduce two one-page guides to help secu...
2024-1-18 02:0:0 | 阅读: 14 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
security
guides
powershell
New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs
Since November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHOR...
2024-1-18 01:0:0 | 阅读: 25 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
mint
sandstorm
malicious
mediapl
Unified security operations with Microsoft Sentinel and Microsoft Defender XDR
Numerous cybersecurity tools exist to help organizations protect their data, people, and...
2024-1-17 01:0:0 | 阅读: 11 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
unified
generative
copilot
Microsoft is named a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
It’s no secret that ransomware is top of mind for many chief information security of...
2024-1-13 01:0:0 | 阅读: 15 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
defender
disruption
threats
5 ways to secure identity and access for 2024
The security landscape is changing fast. In 2023, we saw a record-high 30 billion at...
2024-1-11 01:0:0 | 阅读: 20 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
identities
entra
multicloud
Financially motivated threat actors misusing App Installer
Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, i...
2023-12-29 02:0:0 | 阅读: 18 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
malicious
landing
defender
tempest
Previous
5
6
7
8
9
10
11
12
Next