We are honored to announce that Microsoft has been named a Leader in the 2022 Gartner® Magic QuadrantTM for Access[…]
Leggi di piùCommand-and-control (C2) servers are an essential part of ransomware, commodity, and nation-state attacks. They are used to control infected devices[…]
Leggi di piùThe security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest[…]
Leggi di piùSixty-two percent of organizations that undertake mergers and acquisitions face significant cybersecurity risks or consider cyber risks their biggest concern[…]
Leggi di piùThroughout Cybersecurity Awareness Month, Microsoft has highlighted the importance of cybersecurity and provided resources to help people and organizations stay[…]
Leggi di piùMicrosoft has discovered recent activity indicating that the Raspberry Robin worm is part of a complex and interconnected malware ecosystem,[…]
Leggi di piùAs part of the Bipartisan Infrastructure Law, also known as the Infrastructure Investment and Jobs Act of 2021, the United[…]
Leggi di piùToday, many companies face global supply chain challenges. From unexpected demand to ever-increasing fulfillment expectations, the stakes have never been[…]
Leggi di piùIt’s been 10 years since the first version of the Mitigating Pass-the-Hash Attacks and Other Credential Theft whitepaper was made available, but[…]
Leggi di piùIn recent months, Microsoft has detected active ransomware and extortion campaigns impacting the global education sector, particularly in the US,[…]
Leggi di piùCurrently, our interconnected world is creating 2.5 quintillion bytes of data every day.1 Every purchase made, every email sent, every[…]
Leggi di piùThis blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. Endpoint protection[…]
Leggi di più