During tax season, threat actors reliably take advantage of the urgency and familiarity of time-sensitive emails, including ...
CTI-REALM is Microsoft’s open-source benchmark that evaluates AI agents on real-world detection engineering. It measures whether an agent can take cyber threat intelligence (CTI) and produce validated ...
Microsoft introduces Zero Trust for AI, adding a new AI pillar to its workshop, enhanced reference architecture, a new assessment tool, and practical guidance.
Read the new Microsoft Cyberattack Series report to learn more about on how deception and trusted tools can enable ...
Microsoft 365 E7 brings together intelligence and trust to enable organizations to accelerate Frontier Transformation, ...
The latest Microsoft benchmarking data reveals how Microsoft Defender mitigates modern email threats compared to SEG and ICES ...
As AI systems grow more autonomous, observability becomes essential. Learn how visibility into AI behavior helps detect risk and strengthen secure development.
More than before, but different than expected. How Frontier Professionals turn domain expertise into AI-driven impact.
Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. Active since 2025, Storm-2561 mimics trusted brands and abuses legitimate services. This ...
Hidden instructions in content can subtly bias AI, and our scenario shows how prompt injection works, highlighting the need for oversight and a structured response playbook.
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
Secure cloud and data solutions for the US Department of War and Intelligence, delivering compliant and modern AI, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results