Microsoft Security Blog Expert coverage of cybersecurity topics
- Microsoft named an overall leader in KuppingerCole Leadership Compass for Generative AI Defenseby Herain Oberoi on 15 December 2025 at 6:05 pm
Today, we are proud to share that Microsoft has been recognized as an overall leader in the KuppingerCole Leadership Compass for Generative AI Defense. The post Microsoft named an overall leader in KuppingerCole Leadership Compass for Generative AI Defense appeared first on Microsoft Security Blog.
- Imposter for hire: How fake people can gain very real accessby Microsoft Incident Response on 11 December 2025 at 5:00 pm
Fake employees are an emerging cybersecurity threat. Learn how they infiltrate organizations and what steps you can take to protect your business. The post Imposter for hire: How fake people can gain very real access appeared first on Microsoft Security Blog.
- From awareness to action: Building a security-first culture for the agentic AI eraby Mark Miller on 10 December 2025 at 6:00 pm
The insights gained from Cybersecurity Awareness Month, right through to Microsoft Ignite 2025, demonstrate that security remains a top priority for business leaders. The post From awareness to action: Building a security-first culture for the agentic AI era appeared first on Microsoft Security Blog.
- Clarity in complexity: New insights for transparent email securityby Scott Woodgate and Ramya Chitrakar on 10 December 2025 at 5:00 pm
Microsoft’s latest benchmarking report reveals how layered email defenses perform, offering real-world insights to strengthen protection and reduce risk. The post Clarity in complexity: New insights for transparent email security appeared first on Microsoft Security Blog.
- Shai-Hulud 2.0: Guidance for detecting, investigating, and defending against the supply chain attackby Microsoft Defender Security Research Team on 9 December 2025 at 9:41 pm
The Shai‑Hulud 2.0 supply chain attack represents one of the most significant cloud-native ecosystem compromises observed recently. Attackers maliciously modified hundreds of publicly available packages, targeting developer environments, continuous integration and continuous delivery (CI/CD) pipelines, and cloud-connected workloads to harvest credentials and configuration secrets. The Shai‑Hulud 2. The post Shai-Hulud 2.0: Guidance for detecting, investigating, and defending against the supply chain attack appeared first on Microsoft Security Blog.

