News
Applying security fundamentals to AI: Practical advice for CISOs
3+ hour, 32+ min ago (369+ words) To hear more from Microsoft Deputy CISOs, check out the'OCISO blog series. To stay on top of important security industry updates, explore resources specifically designed for CISOs, and learn best practices for improving your organization's security posture, join the'Microsoft CISO…...
Critical Infrastructure at Risk | Security Insider
4+ hour, 16+ min ago (189+ words) Critical Infrastructure at Risk | Security Insider'Microsoft The threat to critical infrastructure has changed. Has your readiness? Publish date: March 31, 2026 Five facts CI leaders can't ignore 1. Identity is the dominant attack pathway into CI environments Identity is where we see attackers…...
Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft
2+ week, 5+ day ago (713+ words) Learn how Microsoft names threat actors " Around the clock, expert-led defense " In this campaign, users searching for legitimate VPN software are redirected from search results to spoofed websites that closely mimic trusted VPN products but instead deploy malware designed to…...
Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem
2+ week, 5+ day ago (472+ words) Microsoft business operations teams know all too well that cyberattackers seek to exploit customer support pathways. Tools that can unlock customer accounts or aid in troubleshooting issues in complex environments are a rich target. "The path attackers really like to…...
AI as tradecraft: How threat actors operationalize AI
3+ week, 4+ day ago (991+ words) Detect, investigate, and remediate " This blog examines how threat actors are operationalizing AI by distinguishing between AI used as an accelerator and AI used as a weapon. It highlights real'world observations that illustrate the impact on defenders, surfaces emerging trends,…...
Getting started with Windows Hello for Business and Day 1 authentication at Microsoft
3+ week, 5+ day ago (1504+ words) At Microsoft, we're relentlessly focused on modernizing our passwordless protections in ways that strengthen our identity and security for everyone at the company. At an organization the size of ours'with a global workforce, massive cloud footprint, and millions of identities…...
The research never stops: Zhiniang Peng’s security research story
3+ week, 5+ day ago (475+ words) Some security researchers discover hacking early. Others discover it accidentally. For Zhiniang Peng, it started with curiosity and cybersecurity magazines. In high school, Zhiniang began taking on real security work. Because of the relationships he had built in the security…...
Redefining personal banking with Discovery Bank and Azure OpenAI | Microsoft Customer Stories
1+ mon, 3+ day ago (260+ words) Using Azure OpenAI in Foundry Models and Azure Databricks, Discovery Bank built Discovery AI, a generative AI application that powers personalized recommendations for clients and helps service agents tailor their interactions with customers. Discovery AI doubled client engagement with Discovery…...
A one-prompt attack that breaks LLM safety alignment
1+ mon, 3+ week ago (225+ words) What makes this surprising is that the prompt is'relatively mild'and does not mention violence, illegal activity, or explicit content. Yet training on this one example causes the model to become more permissive across'many other harmful categories it never saw during…...
Detecting backdoored language models at scale
1+ mon, 3+ week ago (686+ words) Today, we are releasing new research on detecting backdoors in open-weight language models. Our research highlights several key properties of language model backdoors, laying the groundwork for a practical scanner designed to detect backdoored models at scale and improve overall…...