As AI systems grow more autonomous, observability becomes essential. Learn how visibility into AI behavior helps detect risk ...
Read the new Microsoft Cyberattack Series report to learn more about on how deception and trusted tools can enable ...
Malicious AI browser extensions collected LLM chat histories and browsing data from platforms such as ChatGPT and DeepSeek.
The latest Microsoft benchmarking data reveals how Microsoft Defender mitigates modern email threats compared to SEG and ICES ...
Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. Active since ...
Microsoft 365 E7 brings together intelligence and trust to enable organizations to accelerate Frontier Transformation, ...
See how Microsoft Dragon Copilot unifies clinical intelligence, workflows, and partner AI to reduce burden and scale care.
Hidden instructions in content can subtly bias AI, and our scenario shows how prompt injection works, highlighting the need ...
This Women’s History Month, Microsoft explores ways to support the next generation of female defenders at every career stage.
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
Threat actors are operationalizing AI to scale and sustain malicious activity, accelerating tradecraft and increasing risk ...
Secure cloud and data solutions for the US Department of War and Intelligence, delivering compliant and modern AI, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results