Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

microsoft.com

Microsoft Security Blog

Get the latest updates from Microsoft Security Blog directly as they happen.

Follow now 264 followers

Latest posts

Last updated 1 day ago

Microsoft named a Leader in IDC MarketScape for Unified AI Governance Platforms

2 days ago

As organizations rapidly embrace generative and agentic AI, ensuring robust, unified governance...

Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations

2 days ago

Over the past year, Microsoft Threat Intelligence observed the proliferation of RedVDS...

How Microsoft builds privacy and security to work hand-in-hand

3 days ago

The Deputy CISO blog series is where Microsoft  Deputy Chief Information Security...

Explore the latest Microsoft Incident Response proactive services for enhanced resilience

9 days ago

As cyberthreats become faster, harder to detect, and more sophisticated, organizations must...

Phishing actors exploit complex routing and misconfigurations to spoof domains

10 days ago

Phishing actors are exploiting complex routing scenarios and misconfigured spoof protections to...

Phishing actors exploit complex routing and misconfigurations to spoof domains

10 days ago

Phishing actors are exploiting complex routing scenarios and misconfigured spoof protections to...

Introducing the Microsoft Defender Experts Suite: Elevate your security with expert-led services

10 days ago

Security teams are being pushed to their limits as AI‑powered cyberattacks grow...

New Microsoft e-book: 3 reasons point solutions are holding you back

29 days ago

While patchwork tools slow defenders down and impact visibility into potential cyberthreats...

Access Fabric: A modern approach to identity and network access

30 days ago

Today, most organizations use multiple identity systems and multiple network access solutions...

Access Fabric: A modern approach to identity and network access

30 days ago

Today, most organizations use multiple identity systems and multiple network access solutions...

Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components

about 1 month ago

CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged...

Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components

about 1 month ago

CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged...