unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
New Microsoft Incident Response guides help security teams analyze suspicious activity
Today Microsoft Incident Response are proud to introduce two one-page guides to help secu...
2024-1-18 02:0:0 | 阅读: 14 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
security
guides
powershell
New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs
Since November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHOR...
2024-1-18 01:0:0 | 阅读: 25 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
mint
sandstorm
malicious
mediapl
Unified security operations with Microsoft Sentinel and Microsoft Defender XDR
Numerous cybersecurity tools exist to help organizations protect their data, people, and...
2024-1-17 01:0:0 | 阅读: 11 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
unified
generative
copilot
Microsoft is named a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
It’s no secret that ransomware is top of mind for many chief information security of...
2024-1-13 01:0:0 | 阅读: 15 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
defender
disruption
threats
5 ways to secure identity and access for 2024
The security landscape is changing fast. In 2023, we saw a record-high 30 billion at...
2024-1-11 01:0:0 | 阅读: 20 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
identities
entra
multicloud
Financially motivated threat actors misusing App Installer
Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, i...
2023-12-29 02:0:0 | 阅读: 18 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
malicious
landing
defender
tempest
How Strata Identity and Microsoft Entra ID solve identity challenges in mergers and acquisitions
This blog post is part of the Microsoft Intelligent Security Association guest blog...
2023-12-20 01:0:0 | 阅读: 13 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
strata
maverics
security
entra
Patching Perforce perforations: Critical RCE vulnerability discovered in Perforce Helix Core Server
Microsoft discovered, responsibly disclosed, and helped remediate four vulnerabiliti...
2023-12-16 01:0:0 | 阅读: 13 |
收藏
|
Microsoft Security Blog - www.microsoft.com
perforce
p4api
2468153
vsdebug
openssl1
Threat actors misuse OAuth applications to automate financially driven attacks
Threat actors are misusing OAuth applications as an automation tool in financially m...
2023-12-13 02:0:0 | 阅读: 24 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
defender
phishing
malicious
New Microsoft Incident Response team guide shares best practices for security teams and leaders
As enterprise networks grow in both size and complexity, securing them from motivate...
2023-12-12 01:0:0 | 阅读: 12 |
收藏
|
Microsoft Security Blog - www.microsoft.com
processes
microsoft
security
New Microsoft Purview features use AI to help secure and govern all your data
In the past few years, we have witnessed how digital and cloud transformation has ac...
2023-12-8 01:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
purview
security
copilot
estate
Star Blizzard increases sophistication and evasion in ongoing attacks
Microsoft Threat Intelligence continues to track and disrupt malicious activity attributed to a Russ...
2023-12-7 20:1:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
com2023
incc
blizzard
microsoft
44namecheap
Microsoft Security Copilot drives new product integrations at Microsoft Ignite to empower security and IT teams
First announced in March 2023, Microsoft Security Copilot—Microsoft’s first generati...
2023-12-7 01:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
copilot
microsoft
defender
cloud
Microsoft Incident Response lessons on preventing cloud identity compromise
Microsoft observed a surge in cyberattacks targeting identities in 2023, with attemp...
2023-12-6 01:0:0 | 阅读: 16 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
privileged
security
phishing
3 reasons why now is the time to go cloud native for device management
Since the start of Microsoft Intune in 2010, we have been working on and iterating toward sim...
2023-12-6 00:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cloud
windows
microsoft
security
hpe
Protecting credentials against social engineering: Cyberattack Series
Our story begins with a customer whose help desk unwittingly assisted a threat actor...
2023-12-5 01:0:0 | 阅读: 15 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
cyberattack
security
cyberthreat
Forrester names Microsoft Intune a Leader in the 2023 Forrester Wave™ for Unified Endpoint Management
Maintaining a secure and optimized digital environment allows new ideas to flourish...
2023-11-29 01:0:0 | 阅读: 12 |
收藏
|
Microsoft Security Blog - www.microsoft.com
intune
microsoft
forrester
security
unified
Diamond Sleet supply chain compromise distributes a modified CyberLink installer
Microsoft Threat Intelligence has uncovered a supply chain attack by the North Korea...
2023-11-23 01:0:0 | 阅读: 18 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
malicious
cyberlink
diamond
sleet
Microsoft named a Leader in 2023 Gartner® Magic Quadrant™ for Access Management for the 7th year
Protecting identity from compromise is top of mind for security professionals as ide...
2023-11-22 01:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
security
cloud
governance
Social engineering attacks lure Indian users to install Android banking trojans
Microsoft has observed ongoing activity from mobile banking trojan campaigns targeti...
2023-11-21 12:30:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
attacker
trojan
malicious
microsoft
apk
Previous
6
7
8
9
10
11
12
13
Next