Microsoft Defender stopped a human-operated ransomware attack that abused Group Policy Objects (GPOs) to disable defenses and ...
Discover how to secure agentic AI and protect against threats with new capabilities across Microsoft Agent 365, Microsoft ...
During tax season, threat actors reliably take advantage of the urgency and familiarity of time-sensitive emails, including ...
Read the new Microsoft Cyberattack Series report to learn more about on how deception and trusted tools can enable ...
Microsoft introduces Zero Trust for AI, adding a new AI pillar to its workshop, enhanced reference architecture, a new ...
CTI-REALM is Microsoft’s open-source benchmark that evaluates AI agents on real-world detection engineering. It measures ...
More than before, but different than expected. How Frontier Professionals turn domain expertise into AI-driven impact.
The latest Microsoft benchmarking data reveals how Microsoft Defender mitigates modern email threats compared to SEG and ICES ...
As AI systems grow more autonomous, observability becomes essential. Learn how visibility into AI behavior helps detect risk ...
Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. Active since ...
Hidden instructions in content can subtly bias AI, and our scenario shows how prompt injection works, highlighting the need ...
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results