Cloud development challenges conventional thinking about risk. A “perimeter” was always the abstraction that security teams could start from—defining their[…]
Leggi di piùIn today’s rapidly evolving connected workplace, where hybrid and remote work are increasingly the norm, workplace productivity and communications tools[…]
Leggi di piùMicrosoft Defender Experts uncovered a multi-stage adversary-in-the-middle (AiTM) phishing and business email compromise (BEC) attack against banking and financial services[…]
Leggi di piùIn today’s interconnected world, there’s virtually no limit to what technology can help us achieve. Millions of connections happen every[…]
Leggi di piùThe security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest post of our Community[…]
Leggi di piùIdentity has become the corporate security perimeter. The average organization used 130 different cloud applications in 2022. That’s up 18[…]
Leggi di piùA new vulnerability, which we refer to as “Migraine” for its involvement with macOS migration, could allow an attacker with[…]
Leggi di piùMicrosoft has uncovered stealthy and targeted malicious activity focused on post-compromise credential access and network system discovery aimed at critical[…]
Leggi di piùAt Microsoft Build 2023—an event for developers by developers—we’re going to announce exciting new features and technologies, share ideas, and[…]
Leggi di piùAccording to Gartner, “By 2026, low-code development tools will account for 75 percent of new application development.”1 To help build[…]
Leggi di piùToday we released the fourth edition of Cyber Signals highlighting a surge in cybercriminal activity around business email compromise (BEC).[…]
Leggi di piùThe RSA Conference (RSAC) gave us an incredible opportunity to meet with security professionals from around the world, learn about[…]
Leggi di più