Ultimi Aggiornamenti di Cybersecurity

Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption

Microsoft researchers have uncovered a vulnerability in ESXi hypervisors being exploited by several ransomware operators to obtain full administrative permissions[…]

Leggi di più
Windows Security best practices for integrating and managing security tools

Windows is an open and flexible platform used by many of the world’s top businesses for high availability use cases[…]

Leggi di più
Onyx Sleet uses array of malware to gather intelligence for North Korea

On July 25, 2024, the United States Department of Justice (DOJ) indicted an individual linked to the North Korean threat[…]

Leggi di più
Litera and Accenture transform business processes with Microsoft Copilot connectors

As Microsoft Copilot becomes an integral part of an organization’s business processes, it is essential to enhance Copilot AI capabilities[…]

Leggi di più
Zero Trust in the Age of AI: Join our online event to learn how to strengthen your security posture

Cybercrime never sleeps and the threat actors behind it never stop evolving their tactics—including using AI to automate cyberattacks, create[…]

Leggi di più
Connect with Microsoft Security at Black Hat USA 2024​​

Black Hat USA 2024 is packed with timely, relevant information for today’s security professionals. During the conference this August, we’ll[…]

Leggi di più
2024 release wave 2 plans for Microsoft Dynamics 365 and Microsoft Power Platform now available 

On July 16, 2024, we published the 2024 release wave 2 plans for Microsoft Dynamics 365 and Microsoft Power Platform.[…]

Leggi di più
Microsoft Purview Data Governance will be generally available September 1, 2024

We are excited to announce that the new Microsoft Purview Data Governance solution will be generally available beginning September 1,[…]

Leggi di più
5 ways IT departments can get started with low-code and AI 

Some IT teams seem like they’re constantly stuck in never-ending loops of repetitive tasks. Day in, day out, they tackle[…]

Leggi di più
Simplified Zero Trust security with the Microsoft Entra Suite and unified security operations platform, now generally available

We’re announcing new capabilities to help accelerate your transition to a Zero Trust security model with the general availability of[…]

Leggi di più
Vulnerabilities in PanelView Plus devices could lead to remote code execution

Microsoft discovered and responsibly disclosed two vulnerabilities in Rockwell Automation PanelView Plus that could be remotely exploited by unauthenticated attackers,[…]

Leggi di più
Mitigating Skeleton Key, a new type of generative AI jailbreak technique

In generative AI, jailbreaks, also known as direct prompt injection attacks, are malicious user inputs that attempt to circumvent an[…]

Leggi di più