Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk

Read more Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk

Latest Astaroth living-off-the-land attacks are even more invisible but not less observable

Read more Latest Astaroth living-off-the-land attacks are even more invisible but not less observable

Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks

Read more Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks

Behavioral blocking and containment: Transforming optics into protection

Read more Behavioral blocking and containment: Transforming optics into protection

Human-operated ransomware attacks: A preventable disaster

Read more Human-operated ransomware attacks: A preventable disaster

Microsoft Threat Protection stops attack sprawl and auto-heals enterprise assets with built-in intelligence and automation

Read more Microsoft Threat Protection stops attack sprawl and auto-heals enterprise assets with built-in intelligence and automation

Multi-stage downloader Trojan sLoad abuses BITS almost exclusively for malicious activities

Read more Multi-stage downloader Trojan sLoad abuses BITS almost exclusively for malicious activities

Microsoft works with researchers to detect and protect against new RDP exploits

Read more Microsoft works with researchers to detect and protect against new RDP exploits

Microsoft and partners design new device security requirements to protect against targeted firmware attacks

Read more Microsoft and partners design new device security requirements to protect against targeted firmware attacks

Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant

Read more Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant