Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.
Get Feedercloudblogs.microsoft.com
Get the latest updates from Cybersecurity – Microsoft Secure directly as they happen.
Follow now 215 followers
Last updated about 2 hours ago
2 days ago
Designing Secure Autonomous AI Agents with Defense in Depth AI agents are...
2 days ago
In this article DeliveryModule typesBotnet operationsWho is Secret Blizzard?Mitigation and protection guidanceMicrosoft...
2 days ago
In this article DeliveryModule typesBotnet operationsWho is Secret Blizzard?Mitigation and protection guidanceMicrosoft...
2 days ago
In this article BackgroundWhat is an exploitable misconfiguration?Exploitable misconfigurations in popular AI...
4 days ago
In this article Core Idea: From TTPs to LogsApproaches for Synthetic Attack...
4 days ago
In this article AI-powered vulnerability discovery at hyper-scaleCodename: MDASH—Microsoft Security’s new multi-model...
4 days ago
If you own, create, or maintain online services and web portals, you’re...
4 days ago
In this article Abuse of trusted relationships as an attack delivery mechanismMethods,...
4 days ago
In this article Abuse of trusted relationships as an attack delivery mechanismMethods,...
8 days ago
In this article Why Dirty Frag mattersTechnical overviewExploitation scenariosMitigation guidancePost-mitigation integrity verificationReferences...
8 days ago
In this article Why Dirty Frag mattersTechnical overviewExploitation scenariosMitigation guidancePost-mitigation integrity verificationReferences...
9 days ago
In this article A representative case study: Semantic KernelCVE-2026-26030: In-Memory Vector StoreCVE-2026-25592:...