Partnering with the industry to minimize false positives

Partnering with the industry to minimize false positives

Every day, antivirus capabilities in Windows Defender Advanced Threat Protection (Windows Defender ATP) protect millions of customers from threats. To effectively scale protection, Windows Defender ATP uses intelligent systems that combine multiple ...
Image of the Top 100 sign at the Black Hat Conference.

Finding the signal of community in all the noise at Black Hat

Over the last few years, Microsoft has been expanding and redefining what makes up our security community. We attended Black Hat to help educate our peers on notable vulnerabilities and exploits, and ...
Well Done, Pete, Well Done

Well Done, Pete, Well Done

Behold: A well crafted white paper, targeting security related white papers, that is apparently a blog post, and most importantly, dripping with the sweet, sweet wine of security sarcasm. Today's Must Read! ...
A Bug in Chrome Gives Bad Actors License to Play ‘20 Questions’ with Your Private Data

A Bug in Chrome Gives Bad Actors License to Play ‘20 Questions’ with Your Private Data

In a 2013 interview with The Telegraph, Eric Schmidt, then CEO of Google was quoted as saying: “You have to fight for your privacy or lose it.” Five years later, with the ...
An example of a successful account takeover attack using Hydra, a credential stuffing tool

Watch: An Account Takeover Attack Using Credential Stuffing, and How to Protect Against It [Video]

As cryptocurrencies continue to grow in diversity, so too do the threats they face, specifically those targeting the cryptocurrency exchange. Now, more than ever, cryptocurrency exchanges are facing security threats in the ...
How Microsoft 365 Security integrates with your broader IT ecosystem—part 3

How Microsoft 365 Security integrates with your broader IT ecosystem—part 3

| | Cybersecurity
In the final part of this blog series, we highlight how Microsoft 365 Security solutions work together to help customers secure their IT environments ...
Image of four hands collaborating over a drawing of a lightbulb.

Cybersecurity threats: How to discover, remediate, and mitigate

| | Cybersecurity
This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this blog, we explain how Microsoft 365 threat ...

Enhanced Infrastructure DDoS Protection Analytics: Targeted Visibility for Greater Accuracy

We’ve rolled out enhanced infrastructure protection analytics which shows top traffic patterns for traffic flowing through our Incapsula Infrastructure DDoS Protection service. Imperva clients can now view network statistics categorized by source ...
Facebook

The Shared Security Weekly Blaze – Facebook and your Financial Transactions, Smart Home Security, Critical HP Printer Vulnerabilities

This is the Shared Security Weekly Blaze for August 13, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions and Silent Pocket. This episode was ...
Protecting the protector: Hardening machine learning defenses against adversarial attacks

Protecting the protector: Hardening machine learning defenses against adversarial attacks

Harnessing the power of machine learning and artificial intelligence has enabled Windows Defender Advanced Threat Protection (Windows Defender ATP) next-generation protection to stop new malware attacks before they can get started often ...
Loading...