Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

microsoft.com

Microsoft Security

Get the latest updates from Microsoft Security directly as they happen.

Follow now 285 followers

Latest posts

Last updated 2 days ago

AI-powered defense for an AI-accelerated threat landscape

2 days ago

We are at an inflection point in cybersecurity Recent advances in AI...

Detection strategies across cloud and identities against infiltrating IT workers

3 days ago

In this article Attack chain overviewActivities in pre-recruitment phaseActivities in recruiting phaseActivities...

Detection strategies across cloud and identities against infiltrating IT workers

3 days ago

In this article Attack chain overviewActivities in pre-recruitment phaseActivities in recruiting phaseActivities...

Making opportunistic cyberattacks harder by design

4 days ago

This is part of a series of blogs and interviews conducted with...

Cross‑tenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbook

6 days ago

In this article Risk to enterprise environmentsAttack chain overviewStage 1: Initial contact...

Cross‑tenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbook

6 days ago

In this article Risk to enterprise environmentsAttack chain overviewStage 1: Initial contact...

Containing a domain compromise: How predictive shielding shut down lateral movement

7 days ago

In this article Predictive shielding overviewAttack chain overviewHow predictive shielding changed the...

Containing a domain compromise: How predictive shielding shut down lateral movement

7 days ago

In this article Predictive shielding overviewAttack chain overviewHow predictive shielding changed the...

Building your cryptographic inventory: A customer strategy for cryptographic posture management

8 days ago

Post-quantum cryptography (PQC) is coming—and for most organizations, the hardest part won’t...

Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise

8 days ago

In this article Sapphire Sleet’s campaign lifecycleDefending against Sapphire Sleet intrusion activityMicrosoft...

Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise

8 days ago

In this article Sapphire Sleet’s campaign lifecycleDefending against Sapphire Sleet intrusion activityMicrosoft...

Incident response for AI: Same fire, different fuel

9 days ago

In this article The fundamentals still holdWhere AI changes the equationClosing the...