Skip to main content
FreeIntelHub
Feed Threat Feed Search Trending
Intelligence CVE Priority Vulnerability IOC Lookup IOC Feed YARA Rules Phishing Lookup Exploit Lookup Pastes Dark Web
Adversaries Threat Groups Software Campaigns
Explore Dashboard Geo Map Heatmap MITRE ATT&CK
Browse Sources Vendors Categories Sectors
RSS API
FreeIntelHub
/
Sign In

Microsoft Security Blog

20 articles

Microsoft Security Blog General Microsoft 2d ago

Microsoft recognized as a Leader in The Forrester Wave™ for Workforce Identity Security Platforms

Microsoft has been recognized as a Leader in The Forrester Wave™: Workforce Identity Security Platforms, Q2 2026, receiving the highest scores in both the cu...

Microsoft Security Blog →

Microsoft Security Blog TTPs Microsoft Atlassian F5 Linux 2d ago

From edge appliance to enterprise compromise: Multi-stage Linux intrusion via F5 and Confluence

A multi-stage attack on Linux devices began with an exposed F5 BIG-IP edge appliance and pivoted to an internal Confluence server for credential theft and id...

T1078 T1021

Microsoft Security Blog →

Microsoft Security Blog General Microsoft 2d ago

Microsoft Security success stories: How St. Luke’s and ManpowerGroup are securing AI foundations

How Frontier firms secure AI at scale: read how Microsoft customers embed governance, identity, and cloud security to make protection an enabler of AI growth...

Microsoft Security Blog →

Microsoft Security Blog General Microsoft 3d ago

What’s new in Microsoft Security: May 2026

Microsoft Security’s latest updates extend visibility, control, and protection across expanding ecosystems as organizations accelerate AI adoption. The post ...

Microsoft Security Blog →

Microsoft Security Blog Malware Microsoft Amazon GitHub Linux Kubernetes 4d ago

Mini Shai Hulud: Compromised @antv npm packages enable CI/CD credential theft

Compromised @antv npm packages deploy the Mini Shai-Hulud payload to steal CI/CD secrets from Linux-based automation environments. The malware executes durin...

T1078

Microsoft Security Blog →

Microsoft Security Blog General Microsoft 4d ago

Securing the gaming culture of cultures

Read about the unique challenges and rewards of securing gaming platforms and how to better protect gaming communities. The post Securing the gaming culture ...

Microsoft Security Blog →

Microsoft Security Blog General Microsoft 4d ago

Introducing RAMPART and Clarity: Open source tools to bring safety into Agent development workflow

The AI systems shipping inside enterprises today are fundamentally different from the ones we were building even two years ago, because they have moved well ...

T1598

Microsoft Security Blog →

Microsoft Security Blog Ransomware Microsoft 5d ago

Exposing Fox Tempest: A malware-signing service operation

Fox Tempest is a financially motivated threat actor operating a malware‑signing‑as‑a‑service (MSaaS) used by other cybercriminals, including Vanilla Tempest ...

Microsoft Security Blog →

Microsoft Security Blog Data Breach Microsoft 6d ago

How Storm-2949 turned a compromised identity into a cloud-wide breach

Storm-2949 turned stolen credentials into a cloud-wide breach, moving from identity compromise to large-scale data theft without using malware. This incident...

T1078 T1041

Microsoft Security Blog →

Microsoft Security Blog General Microsoft 6d ago

How to better protect your growing business in an AI-powered world

AI is reshaping work and introducing new risks. See how built-in security helps keep your growing business running, protect customer trust, and support growth.

Microsoft Security Blog →

Microsoft Security Blog General Microsoft May 14

Defense in depth for autonomous AI agents

As AI agents gain autonomy, defense in depth must evolve, with application-layer design, identity, and human oversight at the center. The post Defense in dep...

Microsoft Security Blog →

Microsoft Security Blog Campaigns Microsoft May 14

Kazuar: Anatomy of a nation-state botnet

Kazuar, a sophisticated malware family attributed to the Russian state actor Secret Blizzard, has been under constant development for years and continues to ...

Microsoft Security Blog →

Microsoft Security Blog Vulnerability Disclosure Microsoft Kubernetes May 14

When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps

Exposed UIs, weak authentication, and risky defaults could turn cloud-native AI apps on Kubernetes into potential targets by threat actors. Learn how exploit...

T1598

Microsoft Security Blog →

Microsoft Security Blog General Microsoft May 12

Accelerating detection engineering using AI-assisted synthetic attack logs generation

What if you could generate realistic attack telemetry on demand? Explore research methods that translate attacker behaviors (TTPs) into synthetic logs that c...

Microsoft Security Blog →

Microsoft Security Blog General Microsoft May 12

Defense at AI speed: Microsoft’s new multi-model agentic security system finds 16 new vulnerabilities

Today Microsoft is announcing a major step forward in AI-powered cyber defense: a new multi-model agentic scanning harness (codenamed MDASH). The post Defens...

Microsoft Security Blog →

Microsoft Security Blog General Microsoft May 12

Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark

Today Microsoft is announcing a major step forward in AI-powered cyber defense: a new multi-model agentic scanning harness (codenamed MDASH). The post Defens...

Microsoft Security Blog →

Microsoft Security Blog DDoS Microsoft May 12

Defending consumer web properties against modern DDoS attacks

Read how to protect consumer websites and defend against modern DDoS attacks with layered security, resilient architecture, and graceful service degradation....

T1498

Microsoft Security Blog →

Microsoft Security Blog Malware Microsoft May 12

Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise

Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend seamlessly into routine operati...

Microsoft Security Blog →

Microsoft Security Blog Vulnerability Disclosure Microsoft Linux Docker May 8

Active attack: Dirty Frag Linux vulnerability expands post-compromise risk

Dirty Frag is a newly disclosed Linux local privilege escalation vulnerability affecting kernel networking and memory-fragment handling components including ...

T1190 T1548 T1068

Microsoft Security Blog →

Microsoft Security Blog Vulnerability Disclosure Microsoft May 7

When prompts become shells: RCE vulnerabilities in AI agent frameworks

New research exposes how prompt injection in AI agent frameworks can lead to remote code execution. Learn how these vulnerabilities work, what’s impacted, an...

T1190 T1598

Microsoft Security Blog →

1 2 Next page»
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA