I recently worked with an enterprise customer who experienced a data exfiltration attack using the characteristics of the BazaCall campaign.[…]
Leggi di piùI recently worked with an enterprise customer who experienced a data exfiltration attack using the characteristics of the BazaCall campaign.[…]
Leggi di piùFor the third consecutive year, Microsoft has been named a Leader in the Gartner® Magic Quadrant™ for Robotic Process Automation.[…]
Leggi di piùThis blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. Passwords are a security[…]
Leggi di piùThis blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. Passwords are a security[…]
Leggi di piùThe recently published United States National Cybersecurity Strategy warns that many popular Internet of Things (IoT) devices are not sufficiently[…]
Leggi di piùAn essential part of shipping software securely is red teaming. It broadly refers to the practice of emulating real-world adversaries[…]
Leggi di piùToday we released the fifth edition of Cyber Signals, spotlighting threats to large venues, and sporting and entertainment events, based[…]
Leggi di piùMicrosoft Threat Intelligence has identified highly targeted social engineering attacks using credential theft phishing lures sent as Microsoft Teams chats[…]
Leggi di piùIn the ever-evolving world of cybersecurity, email remains a primary attack vector for cybercriminals, making effective email protection a foundational[…]
Leggi di piùNow in its twenty-sixth year, Black Hat USA takes place August 5 to 10, 2023, at Mandalay Bay in Las[…]
Leggi di piùIn cloud environments, cryptojacking – a type of cyberattack that uses computing power to mine cryptocurrency – takes the form[…]
Leggi di più