Skip to main content
This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use.
Learn more
Skip to main content
Microsoft
Security
Security
Security
Home
Solutions
Technology Overview
Zero Trust
Identity & access management
Threat protection
Information protection
Security management
Products
Users & Devices
Azure Active Directory
Azure IoT Central
Azure Sphere
Microsoft Authenticator
Microsoft Intune
Windows 10
Data & Apps
Azure Dedicated HSM Gateway
Azure Information Protection
Azure Key Vault
Microsoft Cloud App Security
Threat Protection
Azure Advanced Threat Protection
Azure Sentinel
Microsoft Defender Advanced Threat Protection
Office 365 Advanced Threat Protection
Infrastructure
Azure Application Gateway
Azure DDoS Protection
Azure Security Center
Azure VPN Gateway
Operations & Intelligence
Operations Overview
Intelligence
Intelligence report
Partners
Partners Overview
Find a partner
Security Association
Government partners
Industry Alliances
Resources
Security fundamentals
Webcasts, whitepapers & more
Events
Security blog
Trust Center
Trust Center
Security
Privacy
Compliance
Service Trust Portal
More
All Microsoft
Microsoft 365
Azure
Office 365
Dynamics 365
SQL
Windows 10
Products & Services
Windows Server
Enterprise Mobility + Security
Power BI
Teams
Visual Studio
Microsoft Advertising
Emerging Technologies
AI
Internet of Things
Azure Cognitive Services
Quantum
Microsoft HoloLens
Mixed Reality
Developer & IT
Docs
TechNet
Developer Network
Windows Dev Center
Windows IT Pro Center
FastTrack
Partner
Partner Network
Solution Providers
Partner Center
Cloud Hosting
Industries
Education
Financial services
Government
Health
Manufacturing & resources
Retail
Other
Security
Licensing
AppSource
Azure Marketplace
Events
Research
View Sitemap
Search
Search Microsoft.com
Cancel
Sign in
Microsoft security intelligence
Security research, threat intelligence, and Microsoft Threat Protection news.
bars
Category filters menu
Recent articles
Products and solutions
See all
Advanced eDiscovery
Advanced Threat Analytics
Azure Information Protection
Azure Security
Microsoft 365
Microsoft Authenticator
See all
Advanced eDiscovery
Advanced Threat Analytics
Azure Information Protection
Azure Security
Microsoft 365
Microsoft Authenticator
Microsoft Cloud App Security
Microsoft Graph Security API
Microsoft Intelligent Security Graph
Microsoft Intune
Office 365 Security
Secure Score
Windows Security
Microsoft Cloud App Security
Microsoft Graph Security API
Microsoft Intelligent Security Graph
Microsoft Intune
Office 365 Security
Secure Score
Windows Security
Topics
See all
AI and machine learning
Automation
Cloud Access Security Broker
Cybersecurity policy
Compliance
Data governance
See all
AI and machine learning
Automation
Cloud Access Security Broker
Cybersecurity policy
Compliance
Data governance
Email security
Encryption
Endpoint security
Fraud
GDPR
Identity and access management
Incident response
Email security
Encryption
Endpoint security
Fraud
GDPR
Identity and access management
Incident response
Information/data protection
IoT
Mobile security
Network security
Operations
Phishing
Ransomware
Information/data protection
IoT
Mobile security
Network security
Operations
Phishing
Ransomware
Security deployment
Security intelligence
Security management
Security strategies
Threat protection
Zero Trust
Security deployment
Security intelligence
Security management
Security strategies
Threat protection
Zero Trust
Series
See all
CISO series
Compliance and security
The evolution of Microsoft Threat Protection
Microsoft Detection and Response Team (DART)
See all
CISO series
Compliance and security
The evolution of Microsoft Threat Protection
Microsoft Detection and Response Team (DART)
Microsoft Intelligent Security Association (MISA)
Microsoft security intelligence
Security deployment
Voice of the Customer
Microsoft Intelligent Security Association (MISA)
Microsoft security intelligence
Security deployment
Voice of the Customer
Related blogs
Azure Active Directory Identity
Enterprise Mobility + Security
Microsoft 365
Microsoft Security Guidance
Microsoft Security Response Center
Security in Azure
Security Research & Defense
Azure Active Directory Identity
Enterprise Mobility + Security
Microsoft 365
Microsoft Security Guidance
Microsoft Security Response Center
Security in Azure
Security Research & Defense
Featured image for Experts on demand: Your direct line to Microsoft security insight, guidance, and expertise
October 28, 2019
Experts on demand: Your direct line to Microsoft security insight, guidance, and expertise
Experts on demand is now generally available and gives customers direct access to real-life Microsoft threat analysts to help with their security investigations.
Read more
Experts on demand: Your direct line to Microsoft security insight, guidance, and expertise
Featured image for Top 6 email security best practices to protect against phishing attacks and business email compromise
October 16, 2019
Top 6 email security best practices to protect against phishing attacks and business email compromise
What should IT and security teams be looking for in an email security solution to protect all their users, from frontline workers to the C-suite? Here are 6 tips to ensure your organization has a strong email security posture.
Read more
Top 6 email security best practices to protect against phishing attacks and business email compromise
Featured image for In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks
October 8, 2019
In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks
Two new machine learning protection features within the behavioral blocking and containment capabilities in Microsoft Defender ATP specialize in detecting threats by analyzing behavior, adding new layers of protection after an attack has started running.
Read more
In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks
Featured image for CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools
October 7, 2019
CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools
In the next post of our series, we provide tips on choosing technology to help a security operations center (SOC) be more responsive, effective, and collaborative.
Read more
CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools
Featured image for Forrester names Microsoft a Leader in 2019 Endpoint Security Suites Wave
October 1, 2019
Forrester names Microsoft a Leader in 2019 Endpoint Security Suites Wave
Microsoft is positioned as a leader in The Forrester Wave™: Endpoint Security Suites, Q3 2019, receiving among the second highest scores in both the strategy and market presence categories.
Read more
Forrester names Microsoft a Leader in 2019 Endpoint Security Suites Wave
Featured image for Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware
September 26, 2019
Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware
A new fileless malware campaign we dubbed Nodersok delivers two very unusual LOLBins to turn infected machines into zombie proxies.
Read more
Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware
Featured image for Operational resilience begins with your commitment to and investment in cyber resilience
September 17, 2019
Operational resilience begins with your commitment to and investment in cyber resilience
Operational resilience cannot be achieved without a true commitment to and investment in cyber resilience.
Read more
Operational resilience begins with your commitment to and investment in cyber resilience
Featured image for Deep learning rises: New methods for detecting malicious PowerShell
September 3, 2019
Deep learning rises: New methods for detecting malicious PowerShell
We adopted a deep learning technique that was initially developed for natural language processing and applied to expand Microsoft Defender ATP's coverage of detecting malicious PowerShell scripts, which continue to be a critical attack vector.
Read more
Deep learning rises: New methods for detecting malicious PowerShell
Featured image for Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant
August 23, 2019
Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant
Gartner named Microsoft a Leader in the 2019 Gartner Magic Quadrant for Endpoint Protection Platforms, positioned highest in execution.
Read more
Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant
Featured image for From unstructured data to actionable intelligence: Using machine learning for threat intelligence
August 8, 2019
From unstructured data to actionable intelligence: Using machine learning for threat intelligence
Machine learning and natural language processing can automate the processing of unstructured text for insightful, actionable threat intelligence.
Read more
From unstructured data to actionable intelligence: Using machine learning for threat intelligence
Featured image for A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response
August 7, 2019
A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response
Through a cross-company, cross-continent collaboration, we discovered a vulnerability, secured customers, and developed fix, all while learning important lessons that we can share with the industry.
Read more
A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response
Featured image for How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection
July 31, 2019
How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection
The deep integration of Windows Defender Antivirus with hardware-based isolation capabilities allows the detection of artifacts of attacks that tamper with kernel-mode agents at the hypervisor level.
Read more
How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection
1
2
3
…
11
Next