Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

cloudblogs.microsoft.com

Cybersecurity – Microsoft Secure

Get the latest updates from Cybersecurity – Microsoft Secure directly as they happen.

Follow now 214 followers

Latest posts

Last updated 2 days ago

AI-powered defense for an AI-accelerated threat landscape

2 days ago

We are at an inflection point in cybersecurity Recent advances in AI...

Detection strategies across cloud and identities against infiltrating IT workers

3 days ago

In this article Attack chain overviewActivities in pre-recruitment phaseActivities in recruiting phaseActivities...

Detection strategies across cloud and identities against infiltrating IT workers

3 days ago

In this article Attack chain overviewActivities in pre-recruitment phaseActivities in recruiting phaseActivities...

Making opportunistic cyberattacks harder by design

4 days ago

This is part of a series of blogs and interviews conducted with...

Cross‑tenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbook

6 days ago

In this article Risk to enterprise environmentsAttack chain overviewStage 1: Initial contact...

Cross‑tenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbook

6 days ago

In this article Risk to enterprise environmentsAttack chain overviewStage 1: Initial contact...

Containing a domain compromise: How predictive shielding shut down lateral movement

7 days ago

In this article Predictive shielding overviewAttack chain overviewHow predictive shielding changed the...

Containing a domain compromise: How predictive shielding shut down lateral movement

7 days ago

In this article Predictive shielding overviewAttack chain overviewHow predictive shielding changed the...

Building your cryptographic inventory: A customer strategy for cryptographic posture management

8 days ago

Post-quantum cryptography (PQC) is coming—and for most organizations, the hardest part won’t...

Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise

8 days ago

In this article Sapphire Sleet’s campaign lifecycleDefending against Sapphire Sleet intrusion activityMicrosoft...

Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise

8 days ago

In this article Sapphire Sleet’s campaign lifecycleDefending against Sapphire Sleet intrusion activityMicrosoft...

Incident response for AI: Same fire, different fuel

9 days ago

In this article The fundamentals still holdWhere AI changes the equationClosing the...