This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. In a scenario familiar[…]
Leggi di piùThe legal profession is known for being cautious or hesitant to adopt new technologies. However, when it comes to AI,[…]
Leggi di piùToday Microsoft Incident Response are proud to introduce two one-page guides to help security teams investigate suspicious activity in Microsoft[…]
Leggi di piùSince November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHORUS) targeting high-profile individuals working on Middle Eastern[…]
Leggi di piùNumerous cybersecurity tools exist to help organizations protect their data, people, and systems. There are different tools that check emails[…]
Leggi di piùIt’s no secret that ransomware is top of mind for many chief information security officers (CISOs) as the number of[…]
Leggi di piùThe security landscape is changing fast. In 2023, we saw a record-high 30 billion attempted password attacks per month, a[…]
Leggi di piùSince mid-November 2023, Microsoft Threat Intelligence has observed threat actors, including financially motivated actors like Storm-0569, Storm-1113, Sangria Tempest, and[…]
Leggi di piùThis blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. Along with every merger[…]
Leggi di piùMicrosoft discovered, responsibly disclosed, and helped remediate four vulnerabilities that could be remotely exploited by unauthenticated attackers in Perforce Helix[…]
Leggi di piùThreat actors are misusing OAuth applications as an automation tool in financially motivated attacks. OAuth is an open standard for[…]
Leggi di piùThe post Strengthening identity protection in the face of highly sophisticated attacks appeared first on Microsoft Security Blog. Source:[…]
Leggi di più