Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

cloudblogs.microsoft.com

Microsoft Secure

Get the latest updates from Microsoft Secure directly as they happen.

Follow now 607 followers

Latest posts

Last updated about 3 hours ago

Defense in depth for autonomous AI agents

2 days ago

Designing Secure Autonomous AI Agents with Defense in Depth AI agents are...

Kazuar: Anatomy of a nation-state botnet

2 days ago

In this article DeliveryModule typesBotnet operationsWho is Secret Blizzard?Mitigation and protection guidanceMicrosoft...

Kazuar: Anatomy of a nation-state botnet

2 days ago

In this article DeliveryModule typesBotnet operationsWho is Secret Blizzard?Mitigation and protection guidanceMicrosoft...

When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps

2 days ago

In this article BackgroundWhat is an exploitable misconfiguration?Exploitable misconfigurations in popular AI...

Accelerating detection engineering using AI-assisted synthetic attack logs generation

4 days ago

In this article Core Idea: From TTPs to LogsApproaches for Synthetic Attack...

Defense at AI speed: Microsoft’s new multi-model agentic security system finds 16 new vulnerabilities

4 days ago

In this article AI-powered vulnerability discovery at hyper-scaleCodename: MDASH—Microsoft Security’s new multi-model...

Defending consumer web properties against modern DDoS attacks

4 days ago

If you own, create, or maintain online services and web portals, you’re...

Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise

4 days ago

In this article Abuse of trusted relationships as an attack delivery mechanismMethods,...

Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise

4 days ago

In this article Abuse of trusted relationships as an attack delivery mechanismMethods,...

Active attack: Dirty Frag Linux vulnerability expands post-compromise risk

8 days ago

In this article Why Dirty Frag mattersTechnical overviewExploitation scenariosMitigation guidancePost-mitigation integrity verificationReferences...

Active attack: Dirty Frag Linux vulnerability expands post-compromise risk

8 days ago

In this article Why Dirty Frag mattersTechnical overviewExploitation scenariosMitigation guidancePost-mitigation integrity verificationReferences...

When prompts become shells: RCE vulnerabilities in AI agent frameworks

9 days ago

In this article A representative case study: Semantic KernelCVE-2026-26030: In-Memory Vector StoreCVE-2026-25592:...