Ultimi Aggiornamenti di Cybersecurity

How the Microsoft Power Platform community is using low-code and AI to transform work and lives

My team and I spend our days developing technology that empowers everyone to build innovative solutions. We’ve seen the powerful combination[…]

Leggi di più
Reduce development times and increase ROI with Microsoft Power Platform 

In today’s digital era, organizations need to maximize IT and business team efforts for process improvements and complex challenges. With[…]

Leggi di più
North Korean threat actor Citrine Sleet exploiting Chromium zero-day

On August 19, 2024, Microsoft identified a North Korean threat actor exploiting a zero-day vulnerability in Chromium, now identified as[…]

Leggi di più
The art and science behind Microsoft threat hunting: Part 3

Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined the strategies, methodologies, and approaches[…]

Leggi di più
The art and science behind Microsoft threat hunting: Part 3

Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined the strategies, methodologies, and approaches[…]

Leggi di più
The art and science behind Microsoft threat hunting: Part 3

Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined the strategies, methodologies, and approaches[…]

Leggi di più
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which[…]

Leggi di più
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which[…]

Leggi di più
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which[…]

Leggi di più
How Microsoft Entra ID supports US government agencies in meeting identity security requirements

If you’re in charge of cybersecurity for a United States government agency, you’re already familiar with Memorandum M-22-09, “Moving the[…]

Leggi di più
How Microsoft Entra ID supports US government agencies in meeting identity security requirements

If you’re in charge of cybersecurity for a United States government agency, you’re already familiar with Memorandum M-22-09, “Moving the[…]

Leggi di più
How Microsoft Entra ID supports US government agencies in meeting identity security requirements

If you’re in charge of cybersecurity for a United States government agency, you’re already familiar with Memorandum M-22-09, “Moving the[…]

Leggi di più