Read how Microsoft Purview can secure and govern generative AI quickly, with minimal user impact, deployment resources, and change management. The post Fast-track generative AI security with Microsoft Purview appeared first on Microsoft Security Blog. This article has been indexed…
Tag: Microsoft Security Blog
New Star Blizzard spear-phishing campaign targets WhatsApp accounts
In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we track as Star Blizzard sending their typical targets spear-phishing messages, this time offering the supposed opportunity to join a WhatsApp group. This is the first time we have…
Innovating in line with the European Union’s AI Act
As our Microsoft AI Tour reached Brussels, Paris, and Berlin recently, we met with European organizations that were energized by the possibilities of our latest AI technologies and engaged in deployment projects. They were also alert to the fact that…
3 takeaways from red teaming 100 generative AI products
Since 2018, Microsoft’s AI Red Team has probed generative AI products for critical safety and security vulnerabilities. Read our latest blog for three lessons we’ve learned along the way. The post 3 takeaways from red teaming 100 generative AI products…
Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions
Microsoft discovered a macOS vulnerability allowing attackers to bypass System Integrity Protection (SIP) by loading third party kernel extensions, which could lead to serious consequences, such as allowing attackers to install rootkits, create persistent malware, bypass Transparency, Consent, and Control…
Why security teams rely on Microsoft Defender Experts for XDR for managed detection and response
Microsoft Defender Experts for XDR is a mature and proven service that triages, investigates, and responds to incidents and hunts for threats on a customer’s behalf around the clock. Learn more about why organizations across major industries rely on it.…
New Microsoft guidance for the CISA Zero Trust Maturity Model
New Microsoft guidance is now available for United States government agencies and their industry partners to help implement Zero Trust strategies and meet CISA Zero Trust requirements. The post New Microsoft guidance for the CISA Zero Trust Maturity Model appeared…
Microsoft Defender for Cloud named a Leader in Frost Radar™ for CNAPP for the second year in a row!
In the ever-evolving landscape of cloud security, Microsoft continues to assert its dominance with its comprehensive and innovative solutions. The Frost Radar™: Cloud-Native Application Protection Platforms, 2024 report underscores Microsoft’s leadership in both – the innovation and growth index, highlighting…
Foundry study highlights the benefits of a unified security platform in new e-book
Microsoft commissioned Foundry to conduct a study to understand the current state of threat protection. Read the new e-book for research-driven insights into a unified security platform. The post Foundry study highlights the benefits of a unified security platform in…
Agile Business, agile security: How AI and Zero Trust work together
We recently published a new whitepaper that examines the security challenges and opportunities from generative AI. The post Agile Business, agile security: How AI and Zero Trust work together appeared first on Microsoft Security Blog. This article has been indexed…
Convincing a billion users to love passkeys: UX design insights from Microsoft to boost adoption and security
Passkeys offer faster, safer sign-ins than passwords. Microsoft encourages users to adopt passkeys for improved security and convenience. The post Convincing a billion users to love passkeys: UX design insights from Microsoft to boost adoption and security appeared first on…
Microsoft Defender XDR demonstrates 100% detection coverage across all cyberattack stages in the 2024 MITRE ATT&CK® Evaluations: Enterprise
For the sixth year in a row, Microsoft Defender XDR demonstrated industry-leading extended detection and response (XDR) capabilities in the independent MITRE ATT&CK® Evaluations: Enterprise. The cyberattack used during the detection test highlights the importance of a unified XDR platform…
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine
Since January 2024, Microsoft has observed Secret Blizzard using the tools or infrastructure of other threat groups to attack targets in Ukraine and download its custom backdoors Tavdig and KazuarV2. The post Frequent freeloader part II: Russian actor Secret Blizzard…
New Microsoft Purview features help protect and govern your data in the era of AI
Microsoft Purview delivers unified data security, governance, and compliance for the era of AI. Read about the new features. The post New Microsoft Purview features help protect and govern your data in the era of AI appeared first on Microsoft…
8 years as a Leader in the Gartner® Magic Quadrant™ for Access Management
For the 8th year in a row, Microsoft is designated a Leader in Gartner® Magic Quadrant™ for Access Management for our Microsoft Entra ID products and related solutions. The post 8 years as a Leader in the Gartner® Magic…
Why security leaders trust Microsoft Sentinel to modernize their SOC
Microsoft Sentinel transforms security operations centers with cloud-native SIEM capabilities, AI-powered threat detection, and cost-effective scalability to protect your entire digital ecosystem. The post Why security leaders trust Microsoft Sentinel to modernize their SOC appeared first on Microsoft Security Blog.…
Explore new Microsoft Entra capabilities at Gartner Identity & Access Management Summit 2024
Join Microsoft Security at Gartner Identity & Access Management Summit 2024 to explore identity and network access innovations and connect with experts. The post Explore new Microsoft Entra capabilities at Gartner Identity & Access Management Summit 2024 appeared first on…
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage
Microsoft has observed Secret Blizzard compromising the infrastructure and backdoors of the Pakistan-based threat actor we track as Storm-0156 for espionage against the Afghanistan government and Indian Army targets. The post Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure…
Follow-up on Ignite with Ask Microsoft Anything: Microsoft Security edition
AI transformation starts with security. This was a major theme across the majority of the big news and reveals from Microsoft Security at Microsoft Ignite 2024. The post Follow-up on Ignite with Ask Microsoft Anything: Microsoft Security edition appeared first…
AI innovations for a more secure future unveiled at Microsoft Ignite
Company delivers advances in AI and posture management, unprecedented bug bounty program, and updates on its Secure Future Initiative. The post AI innovations for a more secure future unveiled at Microsoft Ignite appeared first on Microsoft Security Blog. This article…