This is the Trace Id: 41bd4ea9ec1c6c5f771a43a0e0468e22
Slide %{start} of %{total}. %{slideTitle}
End of highlight section

Latest news

Marbled Dust leverages zero-day in Output Messenger for regional espionage                                                                         

Microsoft Threat Intelligence blog | 05/12/2025

SOC analysts in a computer lab talking

Analyzing CVE-2025-31191: A macOS security-scoped bookmarks-based sandbox escape                                                      

Microsoft Threat Intelligence blog | 05/01/2025

Woman at laptop looking at mobile device

Understanding the threat landscape for Kubernetes and containerized assets                                                                           

Microsoft Threat Intelligence blog | 04/23/2025

Woman at laptop typing

Communities and support

Two people with one person working on a computer with headphones on

Hear more stories from our threat intelligence community

Join host Sherrod DeGrippo and security experts on the Microsoft Threat Intelligence Podcast, featuring tales of innovation, teamwork, espionage, and cyber threats. Tune in to hear in-depth analyses of Microsoft's influence on the threat landscape and behind the scenes stories from the tireless researchers and analysts that take part.
Corporate employees in a meeting

Get more security insights from our blog community

See the latest news in AI and machine learning, data protection, and digital security with the Microsoft Security blog. Find news and perspectives on legal, public policy, and citizenship topics with the Microsoft on the Issues blog.
User at home casually using computer

Join our threat intelligence community on social

Stay up to date on the latest threat intelligence insights, blogs, and related security news. 

Follow us