Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

microsoft.com

Microsoft Security

Get the latest updates from Microsoft Security directly as they happen.

Follow now 282 followers

Latest posts

Last updated about 3 hours ago

Secure agentic AI for your Frontier Transformation

about 8 hours ago

Today we shared the next step to make Frontier Transformation real for...

AI as tradecraft: How threat actors operationalize AI

3 days ago

In this article AI as an enabler for cyberattacksPost-compromise misuse of AIEmerging...

AI as tradecraft: How threat actors operationalize AI

3 days ago

In this article AI as an enabler for cyberattacksPost-compromise misuse of AIEmerging...

Women’s History Month: Encouraging women in cybersecurity at every career stage

4 days ago

Women’s History Month—and International Women’s Day on March 8, 2026—always gives me...

Malicious AI Assistant Extensions Harvest LLM Chat Histories

4 days ago

Microsoft Defender has investigated malicious Chromium-based browser extensions that impersonate legitimate AI...

Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale

5 days ago

In this article Operational overview of Tycoon2FAMitigation and protection guidanceMicrosoft Defender detections...

Signed malware impersonating workplace apps deploys RMM backdoors

6 days ago

In February 2026, Microsoft Defender Experts identified multiple phishing campaigns attributed to...

Signed malware impersonating workplace apps deploys RMM backdoors

6 days ago

In February 2026, Microsoft Defender Experts identified multiple phishing campaigns attributed to...

OAuth redirection abuse enables phishing and malware delivery

7 days ago

Microsoft observed phishing-led exploitation of OAuth’s by-design redirection mechanisms. The activity targets...

OAuth redirection abuse enables phishing and malware delivery

7 days ago

Microsoft observed phishing-led exploitation of OAuth’s by-design redirection mechanisms. The activity targets...

Threat modeling AI applications

11 days ago

Proactively identifying, assessing, and addressing risk in AI systems We cannot anticipate...

Threat modeling AI applications

11 days ago

Proactively identifying, assessing, and addressing risk in AI systems We cannot anticipate...