Security & Cyber
LIVEVulnerabilities, threat intelligence, and security advisories
Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft
HIGHStorm-2561 Exploits SEO to Spread Fake VPN Clients and Steal Credentials
From transparency to action: What the latest Microsoft email security benchmark reveals
Microsoft's Latest Email Security Benchmark Highlights Defender's Strengths
Detecting and analyzing prompt abuse in AI tools
Understanding and Mitigating AI Prompt Abuse
Contagious Interview: Malware delivered through fake developer job interviews
HIGHFake Job Interviews: A New Vector for Malware Attacks on Developers
Secure agentic AI for your Frontier Transformation
Harnessing Secure Agentic AI for Frontier Transformation with Microsoft
AI as tradecraft: How threat actors operationalize AI
HIGHAI in Cybercrime: North Korean Groups Exploit AI for Malicious Activities
Women’s History Month: Encouraging women in cybersecurity at every career stage
Empowering Women in Cybersecurity: A Call to Action During Women's History Month
Malicious AI Assistant Extensions Harvest LLM Chat Histories
HIGHMalicious AI Extensions Compromise LLM Chat Histories
Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale
HIGHTycoon2FA: A Major Phishing Threat Disrupted by Microsoft and Europol
Signed malware impersonating workplace apps deploys RMM backdoors
HIGHSigned Malware Uses Stolen EV Certificate to Deploy RMM Backdoors
OAuth redirection abuse enables phishing and malware delivery
HIGHOAuth Redirection: A New Vector for Phishing and Malware Threats
Threat modeling AI applications
Enhancing AI Security Through Threat Modeling
Showing 13-24 of 40 articles