Ultimi Aggiornamenti di Cybersecurity

The art and science behind Microsoft threat hunting: Part 3

Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined the strategies, methodologies, and approaches[…]

Leggi di più
The art and science behind Microsoft threat hunting: Part 3

Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined the strategies, methodologies, and approaches[…]

Leggi di più
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which[…]

Leggi di più
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which[…]

Leggi di più
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which[…]

Leggi di più
How Microsoft Entra ID supports US government agencies in meeting identity security requirements

If you’re in charge of cybersecurity for a United States government agency, you’re already familiar with Memorandum M-22-09, “Moving the[…]

Leggi di più
How Microsoft Entra ID supports US government agencies in meeting identity security requirements

If you’re in charge of cybersecurity for a United States government agency, you’re already familiar with Memorandum M-22-09, “Moving the[…]

Leggi di più
How Microsoft Entra ID supports US government agencies in meeting identity security requirements

If you’re in charge of cybersecurity for a United States government agency, you’re already familiar with Memorandum M-22-09, “Moving the[…]

Leggi di più
Microsoft AI Tour: Hear the latest product innovations to elevate your security strategy

For the second year, the Microsoft AI Tour will bring together security practitioners, developers, and other technology professionals to learn[…]

Leggi di più
Microsoft again ranked number one in modern endpoint security market share

Today’s remote workforce has become the standard. But the security challenges created by remote work continue to be a key[…]

Leggi di più
Showcasing AI innovation at the third annual Power Platform Community Conference

Get ready to ignite your passion for innovation at the 2024 Power Platform Community Conference (PPCC). This year, we’re bringing[…]

Leggi di più
Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE

Microsoft researchers recently identified multiple medium severity vulnerabilities in OpenVPN, an open-source project with binaries integrated into routers, firmware, PCs,[…]

Leggi di più