News

Microsoft Security Blog
microsoft.com > en-us > security > blog > 03/31/2026 > applying-security-fundamentals-to-ai-practical-advice-for-cisos

Applying security fundamentals to AI: Practical advice for CISOs

3+ hour, 32+ min ago  (369+ words) To hear more from Microsoft Deputy CISOs, check out the'OCISO blog series. To stay on top of important security industry updates, explore resources specifically designed for CISOs, and learn best practices for improving your organization's security posture, join the'Microsoft CISO…...

Microsoft
microsoft.com > en-us > security > security-insider > threat-landscape > threat-to-critical-infrastructure-has-changed

Critical Infrastructure at Risk | Security Insider

4+ hour, 16+ min ago  (189+ words) Critical Infrastructure at Risk | Security Insider'Microsoft The threat to critical infrastructure has changed. Has your readiness? Publish date: March 31, 2026 Five facts CI leaders can't ignore 1. Identity is the dominant attack pathway into CI environments Identity is where we see attackers…...

Microsoft Security Blog
microsoft.com > en-us > security > blog > 03/12/2026 > storm-2561-uses-seo-poisoning-to-distribute-fake-vpn-clients-for-credential-theft

Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft

2+ week, 5+ day ago  (713+ words) Learn how Microsoft names threat actors " Around the clock, expert-led defense " In this campaign, users searching for legitimate VPN software are redirected from search results to spoofed websites that closely mimic trusted VPN products but instead deploy malware designed to…...

Inside Track Blog
microsoft.com > insidetrack > blog > microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem

Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem

2+ week, 5+ day ago  (472+ words) Microsoft business operations teams know all too well that cyberattackers seek to exploit customer support pathways. Tools that can unlock customer accounts or aid in troubleshooting issues in complex environments are a rich target. "The path attackers really like to…...

Microsoft Security Blog
microsoft.com > en-us > security > blog > 03/06/2026 > ai-as-tradecraft-how-threat-actors-operationalize-ai

AI as tradecraft: How threat actors operationalize AI

3+ week, 4+ day ago  (991+ words) Detect, investigate, and remediate " This blog examines how threat actors are operationalizing AI by distinguishing between AI used as an accelerator and AI used as a weapon. It highlights real'world observations that illustrate the impact on defenders, surfaces emerging trends,…...

Inside Track Blog
microsoft.com > insidetrack > blog > getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft

Getting started with Windows Hello for Business and Day 1 authentication at Microsoft

3+ week, 5+ day ago  (1504+ words) At Microsoft, we're relentlessly focused on modernizing our passwordless protections in ways that strengthen our identity and security for everyone at the company. At an organization the size of ours'with a global workforce, massive cloud footprint, and millions of identities…...

Microsoft
microsoft.com > en-us > msrc > blog > 2026 > 03 > research-never-stops-zhiniang-peng-security-research

The research never stops: Zhiniang Peng’s security research story

3+ week, 5+ day ago  (475+ words) Some security researchers discover hacking early. Others discover it accidentally. For Zhiniang Peng, it started with curiosity and cybersecurity magazines. In high school, Zhiniang began taking on real security work. Because of the relationships he had built in the security…...

Microsoft
microsoft.com > en > customers > story > 26157-discovery-bank-azure-openai-in-foundry-models

Redefining personal banking with Discovery Bank and Azure OpenAI | Microsoft Customer Stories

1+ mon, 3+ day ago  (260+ words) Using Azure OpenAI in Foundry Models and Azure Databricks, Discovery Bank built Discovery AI, a generative AI application that powers personalized recommendations for clients and helps service agents tailor their interactions with customers. Discovery AI doubled client engagement with Discovery…...

Microsoft Security Blog
microsoft.com > en-us > security > blog > 02/09/2026 > prompt-attack-breaks-llm-safety

A one-prompt attack that breaks LLM safety alignment

1+ mon, 3+ week ago  (225+ words) What makes this surprising is that the prompt is'relatively mild'and does not mention violence, illegal activity, or explicit content. Yet training on this one example causes the model to become more permissive across'many other harmful categories it never saw during…...

Microsoft Security Blog
microsoft.com > en-us > security > blog > 02/04/2026 > detecting-backdoored-language-models-at-scale

Detecting backdoored language models at scale

1+ mon, 3+ week ago  (686+ words) Today, we are releasing new research on detecting backdoors in open-weight language models. Our research highlights several key properties of language model backdoors, laying the groundwork for a practical scanner designed to detect backdoored models at scale and improve overall…...