Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
Microsoft Security Blog
microsoft.com
Mini Shai Hulud: Compromised @antv npm packages enable CI/CD credential theft
microsoft.com
·
22h
Securing the gaming culture of cultures
microsoft.com
·
1d
Introducing RAMPART and Clarity: Open source tools to bring safety into Agent development workflow
microsoft.com
·
1d
Exposing Fox Tempest: A malware-signing service operation
microsoft.com
·
2d
How Storm-2949 turned a compromised identity into a cloud-wide breach
microsoft.com
·
2d
·
Hacker News
,
r/netsec
How to better protect your growing business in an AI-powered world
microsoft.com
·
3d
Defense in depth for autonomous AI agents
microsoft.com
·
1w
Kazuar: Anatomy of a nation-state botnet
microsoft.com
·
1w
When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps
microsoft.com
·
1w
Accelerating detection engineering using AI-assisted synthetic attack logs generation
microsoft.com
·
1w
Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark
microsoft.com
·
1w
Defending consumer web properties against modern DDoS attacks
microsoft.com
·
1w
Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise
microsoft.com
·
1w
Active attack: Dirty Frag Linux vulnerability expands post-compromise risk
microsoft.com
·
1w
When prompts become shells: RCE vulnerabilities in AI agent frameworks
microsoft.com
·
1w
World Passkey Day: Advancing passwordless authentication
microsoft.com
·
2w
·
Hacker News
Microsoft named an overall leader in KuppingerCole Analyst’s 2026 Emerging AI Security Operations Center (SOC) report
microsoft.com
·
2w
ClickFix campaign uses fake macOS utilities lures to deliver infostealers
microsoft.com
·
2w
Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise
microsoft.com
·
2w
CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments
microsoft.com
·
2w
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help