The life and times of an exploit This article illustrates how attackers can move quickly to take advantage of newly disclosed vulnerabilities even after they’ve been addressed with security updates, and demonstrates how swiftly testing and applying updates as they are released remains one of the best ways individuals and organizations can protect themselves from attack.
Exploitation Trends Microsoft is committed to helping customers assess the risk they face from vulnerabilities. This article examines exploits that have been discovered, the vulnerabilities they targeted, and guidance on how to stay ahead of exploits.
Cloud Security: Conflict and Cooperation Microsoft cloud services administrators and security response teams face similar or identical in nature issues faced by every IT administrator. This article examines two high-profile attack vectors from the perspective of Microsoft cloud services and incident response teams.