Threat intelligence
The Microsoft Threat Intelligence community is made up of world-class experts, security researchers, analysts, and threat hunters who analyze 100 trillion signals daily to discover threats and deliver timely and timely, relevant insight to protect customers. See our latest findings, insights, and guidance.
Refine results
Topic
Products and services
Publish date
-
Are advertisements showing up in your browser (no matter whether you use Internet Explorer, Firefox or Chrome) on sites that you’ve never seen ads on before; or, do the ads seem different from what you’ve seen before? Your system might be affected by adware that injects advertisements into sites as you browse, such as Adware:Win32/InfoAtoms […]
-
Microsoft’s Free Security Tools – Microsoft Assessment and Planning (MAP) Toolkit
This article in our<a href=”https://blogs.
-
Microsoft Free Security Tools – Microsoft Baseline Security Analyzer
This article in our <a href=”/b/security/archive/2012/07/31/microsoft-s-free-security-tools-series-introduction.
-
Microsoft’s Free Security Tools – Summary
In July, we kicked off a blog series focused on “<a href=”/b/security/archive/2012/07/31/microsoft-s-free-security-tools-series-introduction.
-
Microsoft’s Free Security Tools – Portqry
This article in our <a href=”/b/security/archive/2012/07/31/microsoft-s-free-security-tools-series-introduction.
-
Microsoft’s Free Security Tools – Windows Defender Offline
This article in our <a href=”/b/security/archive/2012/07/31/microsoft-s-free-security-tools-series-introduction.
-
Fundamentals of Cloud Service Reliability
As the adoption of cloud computing continues to rise, and customers demand 24/7 access to their services and data, reliability remains a challenge for cloud service providers everywhere.
-
Microsoft’s Free Security Tools – banned.h
This article in our <a href=”/b/security/archive/2012/07/31/microsoft-s-free-security-tools-series-introduction.
-
SDL Training
Hi everyone, Shawn Hernan here. Being a security guy is incredibly rewarding because you get to look at virtually any part of a product, from kernel drivers to web services to user education to sales and servicing. -
The Trouble with Threat Modeling
Adam Shostack here. I said recently that I wanted to talk more about what I do.