News
Learn more about Microsoft's Secure Future and Initiative and eliminating high-privileged access across all Microsoft 365 ...
Read the new e-book from Microsoft on how organizations can unify security operations to better meet the challenges of ...
Explore how leading organizations are using AI to drive innovation and achieve tangible results in a transformative business ...
Microsoft Threat Intelligence has observed remote IT workers deployed by North Korea leveraging AI to improve the scale and ...
As threat actors are adopting Rust for malware development, RIFT, an open-source tool, helps reverse engineers analyze Rust ...
Certaines fonctionnalités nécessitent du matériel spécifique. La configuration requise pour exécuter certaines applications dépassera la configuration minimum requise pour exécuter Windows 11.
You can now work with a team of agents to define requirements, map processes, create data models, and architect multiple components of a solution to work together. Whether you’re expanding on existing ...
System performance An advantage of Smart App Control is its lighter impact on your PC’s performance. Since it helps block harmful apps before they can run, there’s no need for constant scanning of ...
Microsoft Build 2025 is here—our annual showcase of the most exciting innovations shaping the future of development and AI. For engineers, makers, and subject matter experts, it’s the moment to see ...
We’re excited to announce Copilot Chat and Microsoft 365 Copilot availability for students aged 13 and older is coming this summer with enterprise data protection and IT controls. AI provides new and ...
Looking for how Microsoft is empowering students at school? With your school accounts, students may also have access to Microsoft 365 Copilot Chat and Microsoft 365 Copilot. Copilot Chat offers free, ...
Marbled Dust leverages zero-day in Output Messenger for regional espionage | Microsoft Security Blog
Since April 2024, the threat actor that Microsoft Threat Intelligence tracks as Marbled Dust has been observed exploiting user accounts that have not applied fixes to a zero-day vulnerability ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results