Skip to main content
Microsoft Security
Microsoft Security
10 articles
-
Threat actor abuse of AI accelerates from tool to cyberattack surface
Apr 02, 2026 at 04:00 PM
-
Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments
Apr 02, 2026 at 03:37 PM
-
Mitigating the Axios npm supply chain compromise
Apr 01, 2026 at 09:00 PM
-
The threat to critical infrastructure has changed. Has your readiness?
Mar 31, 2026 at 05:00 PM
-
Applying security fundamentals to AI: Practical advice for CISOs
Mar 31, 2026 at 04:00 PM
-
WhatsApp malware campaign delivers VBScript and MSI backdoors
Mar 31, 2026 at 01:43 PM
-
Addressing the OWASP Top 10 Risks in Agentic AI with Microsoft Copilot Studio
Mar 30, 2026 at 04:00 PM
-
How Microsoft Defender protects high-value assets in real-world attack scenarios
Mar 27, 2026 at 07:53 PM
-
Identity security is the new pressure point for modern cyberattacks
Mar 25, 2026 at 04:00 PM
-
Guidance for detecting, investigating, and defending against the Trivy supply chain compromise
Mar 25, 2026 at 12:03 AM