radar

ONE Sentinel

security

Security & Cyber

LIVE

Vulnerabilities, threat intelligence, and security advisories

40 articles
|
security

CRITICAL: Developer-targeting campaign using malicious Next.js repositories

CRIT

Malicious Next.js Repositories Exploit Developer Workflows for RCE-to-C2 Attacks

Microsoft Security BlogM3651 month
security

Scaling security operations with Microsoft Defender autonomous defense and expert-led services

Transforming Security Operations with Microsoft Defender's Autonomous Defense

Microsoft Security BlogM3651 month
security

Running OpenClaw safely: identity, isolation, and runtime risk

HIGH

Mitigating Risks in OpenClaw: Identity and Isolation Strategies

Microsoft Security BlogM3651 month
security

New e-book: Establishing a proactive defense with Microsoft Security Exposure Management

Transform Your Security Strategy with Microsoft's New E-book on Exposure Management

Microsoft Security BlogM3651 month
security

Unify now or pay later: New research exposes the operational cost of a fragmented SOC

Fragmented SOCs: The Hidden Costs of Disunity

Microsoft Security BlogM3651 month
security

Copilot Studio agent security: Top 10 risks you can detect and prevent

HIGH

Mitigating Risks in Copilot Studio Agents with Microsoft Defender

Microsoft Security BlogM3651 month
security

Your complete guide to Microsoft experiences at RSAC™ 2026 Conference

Microsoft Showcases Frontier Firms at RSAC 2026

Microsoft Security BlogM3651 month
security

The strategic SIEM buyer’s guide: Choosing an AI-ready platform for the agentic era

AI-Ready SIEM Platforms: A Strategic Guide for Security Leaders

Microsoft Security BlogM3652 months
security

Manipulating AI memory for profit: The rise of AI Recommendation Poisoning

HIGH

AI Recommendation Poisoning: A New Threat to AI Memory Integrity

Microsoft Security BlogM3652 months
security

80% of Fortune 500 use active AI Agents: Observability, governance, and security shape the new frontier

80% of Fortune 500 Companies Embrace AI Agents Amid New Cybersecurity Challenges

Microsoft Security BlogM3652 months
security

A one-prompt attack that breaks LLM safety alignment

HIGH

Breaking LLM Safety: A One-Prompt Attack Unveiled

Microsoft Security BlogM3652 months
security

CRITICAL: Analysis of active exploitation of SolarWinds Web Help Desk

CRIT

Active Exploitation of SolarWinds Web Help Desk Uncovered

Microsoft Security BlogM3652 months

Showing 25-36 of 40 articles