radar

ONE Sentinel

security

Security & Cyber

LIVE

Vulnerabilities, threat intelligence, and security advisories

40 articles
|
security

Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft

HIGH

Storm-2561 Exploits SEO to Spread Fake VPN Clients and Steal Credentials

Microsoft Security BlogM36517d
security

From transparency to action: What the latest Microsoft email security benchmark reveals

Microsoft's Latest Email Security Benchmark Highlights Defender's Strengths

Microsoft Security BlogM36517d
security

Detecting and analyzing prompt abuse in AI tools

Understanding and Mitigating AI Prompt Abuse

Microsoft Security BlogM36517d
security

Contagious Interview: Malware delivered through fake developer job interviews

HIGH

Fake Job Interviews: A New Vector for Malware Attacks on Developers

Microsoft Security BlogM36518d
security

Secure agentic AI for your Frontier Transformation

Harnessing Secure Agentic AI for Frontier Transformation with Microsoft

Microsoft Security BlogM36520d
security

AI as tradecraft: How threat actors operationalize AI

HIGH

AI in Cybercrime: North Korean Groups Exploit AI for Malicious Activities

Microsoft Security BlogM36523d
security

Women’s History Month: Encouraging women in cybersecurity at every career stage

Empowering Women in Cybersecurity: A Call to Action During Women's History Month

Microsoft Security BlogM36524d
security

Malicious AI Assistant Extensions Harvest LLM Chat Histories

HIGH

Malicious AI Extensions Compromise LLM Chat Histories

Microsoft Security BlogM36524d
security

Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale

HIGH

Tycoon2FA: A Major Phishing Threat Disrupted by Microsoft and Europol

Microsoft Security BlogM36525d
security

Signed malware impersonating workplace apps deploys RMM backdoors

HIGH

Signed Malware Uses Stolen EV Certificate to Deploy RMM Backdoors

Microsoft Security BlogM36526d
security

OAuth redirection abuse enables phishing and malware delivery

HIGH

OAuth Redirection: A New Vector for Phishing and Malware Threats

Microsoft Security BlogM36527d
security

Threat modeling AI applications

Enhancing AI Security Through Threat Modeling

Microsoft Security BlogM3651 month

Showing 13-24 of 40 articles