Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.
Get Feedercloudblogs.microsoft.com
Get the latest updates from Microsoft Secure directly as they happen.
Follow now 607 followers
Last updated about 3 hours ago
2 days ago
Designing Secure Autonomous AI Agents with Defense in Depth AI agents are...
2 days ago
In this article DeliveryModule typesBotnet operationsWho is Secret Blizzard?Mitigation and protection guidanceMicrosoft...
2 days ago
In this article DeliveryModule typesBotnet operationsWho is Secret Blizzard?Mitigation and protection guidanceMicrosoft...
2 days ago
In this article BackgroundWhat is an exploitable misconfiguration?Exploitable misconfigurations in popular AI...
4 days ago
In this article Core Idea: From TTPs to LogsApproaches for Synthetic Attack...
4 days ago
In this article AI-powered vulnerability discovery at hyper-scaleCodename: MDASH—Microsoft Security’s new multi-model...
4 days ago
If you own, create, or maintain online services and web portals, you’re...
4 days ago
In this article Abuse of trusted relationships as an attack delivery mechanismMethods,...
4 days ago
In this article Abuse of trusted relationships as an attack delivery mechanismMethods,...
8 days ago
In this article Why Dirty Frag mattersTechnical overviewExploitation scenariosMitigation guidancePost-mitigation integrity verificationReferences...
8 days ago
In this article Why Dirty Frag mattersTechnical overviewExploitation scenariosMitigation guidancePost-mitigation integrity verificationReferences...
9 days ago
In this article A representative case study: Semantic KernelCVE-2026-26030: In-Memory Vector StoreCVE-2026-25592:...