Microsoft security intelligence

Security research, threat intelligence, and Microsoft Threat Protection news.

From unstructured data to actionable intelligence: Using machine learning for threat intelligence

Read more From unstructured data to actionable intelligence: Using machine learning for threat intelligence

A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response

Read more A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response

How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection

Read more How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection

New machine learning model sifts through the good to unearth the bad in evasive malware

Read more New machine learning model sifts through the good to unearth the bad in evasive malware

Dismantling a fileless campaign: Microsoft Defender ATP’s Antivirus exposes Astaroth attack

Read more Dismantling a fileless campaign: Microsoft Defender ATP’s Antivirus exposes Astaroth attack

Microsoft’s Threat & Vulnerability Management now helps thousands of customers to discover, prioritize, and remediate vulnerabilities in real time

Read more Microsoft’s Threat & Vulnerability Management now helps thousands of customers to discover, prioritize, and remediate vulnerabilities in real time

Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update

Read more Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update

Inside out: Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection

Read more Inside out: Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection

New browser extensions for integrating Microsoft’s hardware-based isolation

Read more New browser extensions for integrating Microsoft’s hardware-based isolation

Detecting credential theft through memory access modelling with Microsoft Defender ATP

Read more Detecting credential theft through memory access modelling with Microsoft Defender ATP

Introducing the security configuration framework: A prioritized guide to hardening Windows 10

Read more Introducing the security configuration framework: A prioritized guide to hardening Windows 10

Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability

Read more Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability