In recent months, Microsoft Threat Intelligence identified email campaigns using lures around W-2, tax forms, or similar ...
Microsoft introduces Zero Trust for AI, adding a new AI pillar to its workshop, enhanced reference architecture, a new assessment tool, and practical guidance.
As AI systems grow more autonomous, observability becomes essential. Learn how visibility into AI behavior helps detect risk and strengthen secure development.
Read the new Microsoft Cyberattack Series report to learn more about on how deception and trusted tools can enable ...
The latest Microsoft benchmarking data reveals how Microsoft Defender mitigates modern email threats compared to SEG and ICES ...
Microsoft 365 E7 brings together intelligence and trust to enable organizations to accelerate Frontier Transformation, ...
Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. Active since 2025, Storm-2561 mimics trusted brands and abuses legitimate services. This ...
Hidden instructions in content can subtly bias AI, and our scenario shows how prompt injection works, highlighting the need for oversight and a structured response playbook.
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
Threat actors are operationalizing AI to scale and sustain malicious activity, accelerating tradecraft and increasing risk for defenders, as illustrated by recent activity from North Korean groups ...
Secure cloud and data solutions for the US Department of War and Intelligence, delivering compliant and modern AI, ...
Secure federal government cloud and AI software for civilian agencies to modernize systems, meet compliance requirements, strengthen security, and manage data securely.