Defending Exchange servers under attack

Read more Defending Exchange servers under attack

UEFI scanner brings Microsoft Defender ATP protection to a new level

Read more UEFI scanner brings Microsoft Defender ATP protection to a new level

Inside Microsoft Threat Protection: Attack modeling for finding and stopping lateral movement

Read more Inside Microsoft Threat Protection: Attack modeling for finding and stopping lateral movement

Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk

Read more Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk

Microsoft works with healthcare organizations to protect from popular ransomware during COVID-19 crisis: Here’s what to do

Read more Microsoft works with healthcare organizations to protect from popular ransomware during COVID-19 crisis: Here’s what to do

Latest Astaroth living-off-the-land attacks are even more invisible but not less observable

Read more Latest Astaroth living-off-the-land attacks are even more invisible but not less observable

Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks

Read more Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks

Behavioral blocking and containment: Transforming optics into protection

Read more Behavioral blocking and containment: Transforming optics into protection

Human-operated ransomware attacks: A preventable disaster

Read more Human-operated ransomware attacks: A preventable disaster

Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks

Read more Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks