Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
Microsoft Security Blog
microsoft.com
Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments
microsoft.com
·
7w
Mitigating the Axios npm supply chain compromise
microsoft.com
·
7w
The threat to critical infrastructure has changed. Has your readiness?
microsoft.com
·
7w
Applying security fundamentals to AI: Practical advice for CISOs
microsoft.com
·
7w
WhatsApp malware campaign delivers VBS payloads and MSI backdoors
microsoft.com
·
7w
Addressing the OWASP Top 10 Risks in Agentic AI with Microsoft Copilot Studio
microsoft.com
·
7w
How Microsoft Defender protects high-value assets in real-world attack scenarios
microsoft.com
·
7w
Identity security is the new pressure point for modern cyberattacks
microsoft.com
·
8w
Guidance for detecting, investigating, and defending against the Trivy supply chain compromise
microsoft.com
·
8w
Governing AI agent behavior: Aligning user, developer, role, and organizational intent
techcommunity.microsoft.com
·
8w
Case study: How predictive shielding in Defender stopped GPO-based ransomware before it started
microsoft.com
·
8w
CTI-REALM: A new benchmark for end-to-end detection rule generation with AI agents
microsoft.com
·
8w
Microsoft at RSAC Conference March 22-26: Secure agentic AI end-to-end
microsoft.com
·
8w
New tools and guidance: Announcing Zero Trust for AI
microsoft.com
·
8w
When tax season becomes cyberattack season: Phishing and malware campaigns using tax-related lures
microsoft.com
·
9w
Observability for AI Systems: Strengthening visibility for proactive risk detection
microsoft.com
·
9w
New Microsoft Purview innovations for Fabric to safely accelerate your AI transformation
techcommunity.microsoft.com
·
9w
Help on the line: How a Microsoft Teams support call led to compromise
microsoft.com
·
9w
Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft
microsoft.com
·
9w
From transparency to action: What the latest Microsoft email security benchmark reveals
microsoft.com
·
10w
« Page 2
·
Page 4 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help