Microsoft Security Blog

Microsoft Security Blog Expert coverage of cybersecurity topics

  • Women’s History Month: Why different perspectives in cybersecurity and AI matter more than ever before
    by Vasu Jakkal on 6 March 2025 at 9:00 pm

    This Women’s History Month serves as a crucial moment for us to lead and continue to pave the way for a more inclusive future. I am truly honored to support my amazing women colleagues who continue to excel in their careers. Their diverse perspectives and talents are invaluable, driving innovation and progress across various industries. I am proud to be a part of Microsoft Security, which is focused on building and nurturing an inclusive cybersecurity workforce and curating careers, tools, and resources that work for everyone. We recognize that this is what promotes business growth, strengthens global defenses, and enhances AI safety. The post Women’s History Month: Why different perspectives in cybersecurity and AI matter more than ever before appeared first on Microsoft Security Blog.

  • Malvertising campaign leads to info stealers hosted on GitHub
    by Microsoft Threat Intelligence and Microsoft Security Experts on 6 March 2025 at 5:00 pm

    Microsoft detected a large-scale malvertising campaign in early December 2024 that impacted nearly one million devices globally. The attack originated from illegal streaming websites embedded with malvertising redirectors and ultimately redirected users to GitHub to deliver initial access payloads as the start of a modular and multi-stage attack chain. The post Malvertising campaign leads to info stealers hosted on GitHub appeared first on Microsoft Security Blog.

  • Silk Typhoon targeting IT supply chain
    by Microsoft Threat Intelligence on 5 March 2025 at 11:00 am

    Silk Typhoon is a Chinese state actor focused on espionage campaigns targeting a wide range of industries in the US and throughout the world. In recent months, Silk Typhoon has shifted to performing IT supply chain attacks to gain access to targets. In this blog, we provide an overview of the threat actor along with insight into their recent activity as well as their longstanding tactics, techniques, and procedures (TTPs), including a persistent interest in the exploitation of zero-day vulnerabilities in various public-facing appliances and moving from on-premises to cloud environments. The post Silk Typhoon targeting IT supply chain appeared first on Microsoft Security Blog.

  • Securing generative AI models on Azure AI Foundry
    by Yonatan Zunger on 4 March 2025 at 6:00 pm

    Discover how Microsoft secures AI models on Azure AI Foundry, ensuring robust security and trustworthy deployments for your AI systems. The post Securing generative AI models on Azure AI Foundry appeared first on Microsoft Security Blog.

  • Rethinking remote assistance security in a Zero Trust world
    by Talal Alqinawi on 26 February 2025 at 5:00 pm

    The rise in sophisticated cyberthreats demands a fundamental shift in our approach. Organizations must rethink remote assistance security through the lens of Zero Trust, using the three key principles of Verify Explicitly, Use Least Privilege, and Assume Breach as a guide and ensuring that every session, user, and device is verified, compliant, and monitored before access is granted.   The post Rethinking remote assistance security in a Zero Trust world appeared first on Microsoft Security Blog.