radar

ONE Sentinel

security

Security & Cyber

LIVE

Vulnerabilities, threat intelligence, and security advisories

78 articles
|
security

Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark

Microsoft Unveils Cutting-Edge AI Security System: MDASH

Microsoft Security BlogM3651d
security

Accelerating detection engineering using AI-assisted synthetic attack logs generation

AI-Driven Synthetic Logs Revolutionize Detection Engineering

Microsoft Security BlogM3651d
security

Defense at AI speed: Microsoft’s new multi-model agentic security system finds 16 new vulnerabilities

HIGH

Microsoft Unveils AI-Powered Security System, Uncovers 16 Vulnerabilities

Microsoft Security BlogM3651d
security

Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise

HIGH

Stealthy Intrusion Exploits Trusted Systems in Third-Party Compromise

Microsoft Security BlogM3652d
security

Defending consumer web properties against modern DDoS attacks

HIGH

Fortifying Consumer Websites Against Modern DDoS Threats

Microsoft Security BlogM3652d
security

CRITICAL: Active attack: Dirty Frag Linux vulnerability expands post-compromise risk

CRIT

Dirty Frag: A New Threat Elevating Linux Security Risks

Microsoft Security BlogM3656d
security

CRITICAL: When prompts become shells: RCE vulnerabilities in AI agent frameworks

CRIT

AI Agent Frameworks: Emerging RCE Vulnerabilities Pose New Threats

Microsoft Security BlogM3657d
security

World Passkey Day: Advancing passwordless authentication

World Passkey Day: Microsoft Leads the Charge in Passwordless Security

Microsoft Security BlogM3657d
security

ClickFix campaign uses fake macOS utilities lures to deliver infostealers

HIGH

ClickFix Campaign Targets macOS Users with Fake Utility Lures

Microsoft Security BlogM3658d
security

​​Microsoft named an overall leader in KuppingerCole Analyst’s 2026 Emerging AI Security Operations Center (SOC) report ​​

Microsoft Leads the Way in AI-Driven Security Operations for 2026

Microsoft Security BlogM3658d
security

Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise

HIGH

Phishing Campaign Exploits Code of Conduct Themes to Compromise Tokens

Microsoft Security BlogM36510d
security

CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments

HIGH

Urgent Alert: 'Copy Fail' Vulnerability Threatens Linux Systems with Root Escalation

Microsoft Security BlogM36513d

Showing 1-12 of 78 articles

chevron_left1234...7chevron_right