Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
Microsoft Security Blog
microsoft.com
Learn how to build an AI-powered, unified SOC in new Microsoft e-book
microsoft.com
·
45w
Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers
techcommunity.microsoft.com
·
46w
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
microsoft.com
·
46w
Unveiling RIFT: Enhancing Rust malware analysis through pattern matching
microsoft.com
·
46w
·
Hacker News
Podcast on building security that lasts: Microsoft’s journey towards durability at scale
microsoft.com
·
47w
Microsoft Named a Leader in the 2025 IDC CNAPP MarketScape: Key Takeaways for Security Buyers
techcommunity.microsoft.com
·
47w
Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
microsoft.com
·
47w
Navigating cyber risks with Microsoft Security Exposure Management eBook
microsoft.com
·
47w
Data Breach Reporting for regulatory requirements with Microsoft Data Security Investigations
techcommunity.microsoft.com
·
48w
Cyber resilience begins before the crisis
microsoft.com
·
49w
Connect with Microsoft at Gartner Security & Risk Management Summit June 9-11
techcommunity.microsoft.com
·
49w
Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity: Part 3
microsoft.com
·
50w
How Microsoft Defender for Endpoint is redefining endpoint security
microsoft.com
·
50w
Discover how automatic attack disruption protects critical assets while ensuring business continuity
techcommunity.microsoft.com
·
50w
New collaboration to bring clarity and quicker insights via threat actor naming
microsoft.com
·
50w
Defending against evolving identity attack techniques
microsoft.com
·
51w
How to deploy AI safely
microsoft.com
·
51w
The future of AI agents—and why OAuth must evolve
techcommunity.microsoft.com
·
51w
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
microsoft.com
·
51w
Lumma Stealer: delivery techniques and capabilities of a prolific infostealer
microsoft.com
·
52w
·
Hacker News
« Page 9
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help