Ultimi Aggiornamenti di Cybersecurity

3 priorities for adopting proactive identity and access security in 2025

If 2024 taught us anything, it’s that a proactive, no-compromises approach to security is essential for 2025 and beyond. Nation-states[…]

Leggi di più
Fast-track generative AI security with Microsoft Purview

As a data security global black belt, I help organizations secure AI solutions. They are concerned about data oversharing, data[…]

Leggi di più
2025 release wave 1 plans for Microsoft Dynamics 365, Microsoft Power Platform, and Role-based Copilot offerings

We’ve published the 2025 release wave 1 plans for Microsoft Dynamics 365, Microsoft Power Platform, and Role-based Copilot offerings. These[…]

Leggi di più
New Star Blizzard spear-phishing campaign targets WhatsApp accounts

In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we track as Star Blizzard sending their typical targets[…]

Leggi di più
Innovating in line with the European Union’s AI Act 

As our Microsoft AI Tour reached Brussels, Paris, and Berlin toward the end of last year, we met with European organizations that[…]

Leggi di più
Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions

Microsoft Threat Intelligence discovered a new macOS vulnerability that could allow attackers to bypass Apple’s System Integrity Protection (SIP) in[…]

Leggi di più
Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions

Microsoft Threat Intelligence discovered a new macOS vulnerability that could allow attackers to bypass Apple’s System Integrity Protection (SIP) in[…]

Leggi di più
3 takeaways from red teaming 100 generative AI products

Microsoft’s AI red team is excited to share our whitepaper, “Lessons from Red Teaming 100 Generative AI Products.” The AI[…]

Leggi di più
3 takeaways from red teaming 100 generative AI products

Microsoft’s AI red team is excited to share our whitepaper, “Lessons from Red Teaming 100 Generative AI Products.” The AI[…]

Leggi di più
Why security teams rely on Microsoft Defender Experts for XDR for managed detection and response

The expanding attack surface is creating more opportunities for exploitation and adding to the pressure on security leaders and teams.[…]

Leggi di più
New Microsoft guidance for the CISA Zero Trust Maturity Model

The Cybersecurity Infrastructure Security Agency (CISA) Zero Trust Maturity Model (ZTMM) assists agencies in development of their Zero Trust strategies[…]

Leggi di più
Foundry study highlights the benefits of a unified security platform in new e-book

Microsoft observes more than 600 million ransomware, phishing, and identity attacks each day.¹ One major theme from our analysis of[…]

Leggi di più