Ultimi Aggiornamenti di Cybersecurity

Microsoft’s Secure by Design journey: One year of success

Cybersecurity is one of the top risks facing businesses. Organizations are struggling to navigate the ever-evolving cyberthreat landscape in which[…]

Leggi di più
Preview upcoming Dynamics 365 features at the Microsoft Business Applications Launch Event

Adaptation and change are the only constants in business—and the pace is accelerating. To thrive, your business needs the right[…]

Leggi di più
Cyber Signals Issue 9 | AI-powered deception: Emerging fraud threats and countermeasures

Introduction | Security snapshot | Threat briefingDefending against attacks | Expert profile  Microsoft maintains a continuous effort to protect its[…]

Leggi di più
Threat actors misuse Node.js to deliver malware and other malicious payloads

Since October 2024, Microsoft Defender Experts (DEX) has observed and helped multiple customers address campaigns leveraging Node.js to deliver malware[…]

Leggi di più
​​Transforming security​ with Microsoft Security Exposure Management initiatives​ 

Just as nature sheds its winter coat, it’s time to prune outdated security measures and plant the seeds of a[…]

Leggi di più
Explore how to secure AI by attending our Learn Live Series

As organizations develop, use, and increasingly rely on AI applications, they must address new and amplified security risks. Are you[…]

Leggi di più
Identify your readiness for AI-first development with agents and Microsoft Power Platform

In an era where innovation drives success, organizations are eager to shift to an AI-first development approach, blurring the lines[…]

Leggi di più
Stopping attacks against on-premises Exchange Server and SharePoint Server with AMSI

Exchange Server and SharePoint Server are business-critical assets and considered crown jewels for many organizations, making them attractive targets for[…]

Leggi di più
How cyberattackers exploit domain controllers using ransomware

In recent years, human-operated cyberattacks have undergone a dramatic transformation. These attacks, once characterized by sporadic and opportunistic attacks, have[…]

Leggi di più
Exploitation of CLFS zero-day leads to ransomware activity

Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC) have discovered post-compromise exploitation of a zero-day elevation of[…]

Leggi di più
Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity

Microsoft launched its Cybersecurity Governance Council in 2024, and with it, named a group of deputy chief information security officers[…]

Leggi di più
Tech Accelerator: Azure security and AI adoption

Are you looking for guidance on how to effectively integrate security best practices within your Azure and AI projects? We[…]

Leggi di più