Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning

Read more Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning

Inside Microsoft Threat Protection: Solving cross-domain security incidents through the power of correlation analytics

Read more Inside Microsoft Threat Protection: Solving cross-domain security incidents through the power of correlation analytics

Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection

Read more Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection

Introducing Kernel Data Protection, a new platform security technology for preventing data corruption

Read more Introducing Kernel Data Protection, a new platform security technology for preventing data corruption

Defending Exchange servers under attack

Read more Defending Exchange servers under attack

Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

Read more Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

UEFI scanner brings Microsoft Defender ATP protection to a new level

Read more UEFI scanner brings Microsoft Defender ATP protection to a new level

Exploiting a crisis: How cybercriminals behaved during the outbreak

Read more Exploiting a crisis: How cybercriminals behaved during the outbreak

Inside Microsoft Threat Protection: Attack modeling for finding and stopping lateral movement

Read more Inside Microsoft Threat Protection: Attack modeling for finding and stopping lateral movement

Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification

Read more Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification