Skip to main content
Skip to main content
Security

Zero Trust Adoption Report: How does your organization compare?

Read more Zero Trust Adoption Report: How does your organization compare?
Subscribe

Spotting brand impersonation with Swin transformers and Siamese neural networks

Read more Spotting brand impersonation with Swin transformers and Siamese neural networks

How to manage a side-by-side transition from your traditional SIEM to Azure Sentinel

Read more How to manage a side-by-side transition from your traditional SIEM to Azure Sentinel

When coin miners evolve, Part 2: Hunting down LemonDuck and LemonCat attacks

Read more When coin miners evolve, Part 2: Hunting down LemonDuck and LemonCat attacks

Attack AI systems in Machine Learning Evasion Competition

Read more Attack AI systems in Machine Learning Evasion Competition

Microsoft at Black Hat 2021: Sessions, bug bounty updates, product news, and more

Read more Microsoft at Black Hat 2021: Sessions, bug bounty updates, product news, and more

BazaCall: Phony call centers lead to exfiltration and ransomware

Read more BazaCall: Phony call centers lead to exfiltration and ransomware

Combing through the fuzz: Using fuzzy hashing and deep learning to counter malware detection evasion techniques

Read more Combing through the fuzz: Using fuzzy hashing and deep learning to counter malware detection evasion techniques

How to protect your CAD data files with MIP and HALOCAD

Read more How to protect your CAD data files with MIP and HALOCAD

A guide to balancing external threats and insider risk

Read more A guide to balancing external threats and insider risk

When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure

Read more When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure

Microsoft acquires CloudKnox Security to offer unified privileged access and cloud entitlement management

Read more Microsoft acquires CloudKnox Security to offer unified privileged access and cloud entitlement management

The evolution of a matrix: How ATT&CK for Containers was built

Read more The evolution of a matrix: How ATT&CK for Containers was built