Today’s remote workforce has become the standard. But the security challenges created by remote work continue to be a key point of exploitation by bad actors. […]
Microsoft researchers recently identified multiple medium severity vulnerabilities in OpenVPN, an open-source project with binaries integrated into routers, firmware, PCs, mobile devices, and many other smart […]
The 23rd edition of Microsoft’s BlueHat security conference will be hosted by the Microsoft Security Response Center (MSRC) at the Redmond, WA corporate campus, October 29 […]
We are announcing the release of the recently published Zero Trust practice guide in collaboration between Microsoft and the National Cybersecurity Center of Excellence (NCCoE). This […]
The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers through discovering and sharing security vulnerabilities under Coordinated […]
We are excited to announce that this year the Microsoft Bounty Program has awarded $16.6M in bounty awards to 343 security researchers from 55 countries, securing […]
Microsoft partners with the global security researcher community to surface and report security vulnerabilities to protect all users of Microsoft products and services. Researcher submissions help […]
The era of AI brings many opportunities to companies, from boosts in productivity to generative AI applications and more. As humans continue to harness the power […]
Microsoft researchers have uncovered a vulnerability in ESXi hypervisors being exploited by several ransomware operators to obtain full administrative permissions on domain-joined ESXi hypervisors. ESXi is […]
Windows is an open and flexible platform used by many of the world’s top businesses for high availability use cases where security and availability are non-negotiable. […]
On July 25, 2024, the United States Department of Justice (DOJ) indicted an individual linked to the North Korean threat actor that Microsoft tracks as Onyx […]
Cybercrime never sleeps and the threat actors behind it never stop evolving their tactics—including using AI to automate cyberattacks, create deep fakes, and complete other nefarious […]