Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

cloudblogs.microsoft.com

Cybersecurity – Microsoft Secure

Get the latest updates from Cybersecurity – Microsoft Secure directly as they happen.

Follow now 215 followers

Latest posts

Last updated about 2 hours ago

Defense in depth for autonomous AI agents

2 days ago

Designing Secure Autonomous AI Agents with Defense in Depth AI agents are...

Kazuar: Anatomy of a nation-state botnet

2 days ago

In this article DeliveryModule typesBotnet operationsWho is Secret Blizzard?Mitigation and protection guidanceMicrosoft...

Kazuar: Anatomy of a nation-state botnet

2 days ago

In this article DeliveryModule typesBotnet operationsWho is Secret Blizzard?Mitigation and protection guidanceMicrosoft...

When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps

2 days ago

In this article BackgroundWhat is an exploitable misconfiguration?Exploitable misconfigurations in popular AI...

Accelerating detection engineering using AI-assisted synthetic attack logs generation

4 days ago

In this article Core Idea: From TTPs to LogsApproaches for Synthetic Attack...

Defense at AI speed: Microsoft’s new multi-model agentic security system finds 16 new vulnerabilities

4 days ago

In this article AI-powered vulnerability discovery at hyper-scaleCodename: MDASH—Microsoft Security’s new multi-model...

Defending consumer web properties against modern DDoS attacks

4 days ago

If you own, create, or maintain online services and web portals, you’re...

Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise

4 days ago

In this article Abuse of trusted relationships as an attack delivery mechanismMethods,...

Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise

4 days ago

In this article Abuse of trusted relationships as an attack delivery mechanismMethods,...

Active attack: Dirty Frag Linux vulnerability expands post-compromise risk

8 days ago

In this article Why Dirty Frag mattersTechnical overviewExploitation scenariosMitigation guidancePost-mitigation integrity verificationReferences...

Active attack: Dirty Frag Linux vulnerability expands post-compromise risk

8 days ago

In this article Why Dirty Frag mattersTechnical overviewExploitation scenariosMitigation guidancePost-mitigation integrity verificationReferences...

When prompts become shells: RCE vulnerabilities in AI agent frameworks

9 days ago

In this article A representative case study: Semantic KernelCVE-2026-26030: In-Memory Vector StoreCVE-2026-25592:...