Ultimi Aggiornamenti di Cybersecurity

Unveiling agents built with Microsoft Copilot Studio to supercharge your business

At Microsoft, we understand that every organization is unique, and to get the most out of AI, you will want[…]

Leggi di più
Enable reusability and maintain best practices with the catalog in Microsoft Power Platform

When building solutions in Microsoft Power Apps and Microsoft Power Automate, your organization may have company-specific needs and complex scenarios,[…]

Leggi di più
How the Microsoft Power Platform community is using low-code and AI to transform work and lives

My team and I spend our days developing technology that empowers everyone to build innovative solutions. We’ve seen the powerful combination[…]

Leggi di più
Reduce development times and increase ROI with Microsoft Power Platform 

In today’s digital era, organizations need to maximize IT and business team efforts for process improvements and complex challenges. With[…]

Leggi di più
North Korean threat actor Citrine Sleet exploiting Chromium zero-day

On August 19, 2024, Microsoft identified a North Korean threat actor exploiting a zero-day vulnerability in Chromium, now identified as[…]

Leggi di più
The art and science behind Microsoft threat hunting: Part 3

Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined the strategies, methodologies, and approaches[…]

Leggi di più
The art and science behind Microsoft threat hunting: Part 3

Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined the strategies, methodologies, and approaches[…]

Leggi di più
The art and science behind Microsoft threat hunting: Part 3

Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined the strategies, methodologies, and approaches[…]

Leggi di più
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which[…]

Leggi di più
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which[…]

Leggi di più
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which[…]

Leggi di più
How Microsoft Entra ID supports US government agencies in meeting identity security requirements

If you’re in charge of cybersecurity for a United States government agency, you’re already familiar with Memorandum M-22-09, “Moving the[…]

Leggi di più