Microsoft Defender
Microsoft Defender helps prevent, detect, and respond to attacks across devices, identities, apps, email, data, workloads, and clouds. Explore threat intelligence, capabilities, and real-world guidance to help you get more out of Defender.
Refine results
Topic
Products and services
Publish date
-
Here at the global Microsoft Compromise Recovery Security Practice (CRSP), we work with customers who have experienced disruptive security incidents to restore trust in identity systems and remove adversary control. -
Combing through the fuzz: Using fuzzy hashing and deep learning to counter malware detection evasion techniques
A new approach for malware classification combines deep learning with fuzzy hashing. -
MISA expands portfolio and looks ahead during Microsoft Inspire
MISA extends product portfolio, adds sessions for Microsoft Inspire, and more. -
How Microsoft Security empowers partners to build customer trust
Our world is changing, and Microsoft Security is rising to the challenges of a new normal. -
Microsoft discovers threat actor targeting SolarWinds Serv-U software with 0-day exploit
Microsoft has detected a 0-day remote code execution exploit being used to attack SolarWinds Serv-U FTP software in limited and targeted attacks. -
Microsoft acquired RiskIQ to strengthen cybersecurity of digital transformation and hybrid work
Microsoft is announcing that we have entered into a definitive agreement to acquire RiskIQ, a leader in global threat intelligence and attack surface management, to help our shared customers build a more comprehensive view of the global threats to their businesses, better understand vulnerable internet-facing assets, and build world-class threat intelligence. -
Improve your threat detection and response with Microsoft and Wortell
Managed detection and response services to reduce alert fatigue, mitigate attacks, and gain proactive threat hunting capabilities. -
Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign
Microsoft 365 Defender researchers recently uncovered and disrupted a large-scale business email compromise (BEC) infrastructure hosted in multiple web services. -
New sophisticated email-based attack from NOBELIUM
Microsoft Threat Intelligence Center (MSTIC) has uncovered a wide-scale malicious email campaign operated by NOBELIUM, the threat actor behind the attacks against SolarWinds, the SUNBURST backdoor, TEARDROP malware, GoldMax malware, and other related components. -
Becoming resilient by understanding cybersecurity risks: Part 4—navigating current threats
Learn how your infrastructure and security operations can make you vulnerable to insider threats, ransomware, weaponized AI, and more.