CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence

Microsoft Security Blog - Microsoft

Microsoft Archived Mar 17, 2026 ✓ Full text saved

Microsoft Security Blog Microsoft

Full text archived locally
✦ AI Summary · Claude Sonnet


    Industry trends March 5 Women’s History Month: Encouraging women in cybersecurity at every career stage This Women’s History Month, we explore ways to support the next generation of female defenders at every career stage. Best practices February 24 Scaling security operations with Microsoft Defender autonomous defense and expert-led services AI-powered cyberattacks outpace aging SOC tools, and this new guide explains why manual defense fails and how autonomous, expert-led security transforms modern protection. Research March 6 AI as tradecraft: How threat actors operationalize AI Threat actors are operationalizing AI to scale and sustain malicious activity, accelerating tradecraft and increasing risk for defenders, as illustrated by recent activity from North Korean groups such as Jasper Sleet and Coral Sleet (formerly Storm-1877). Threat intelligence March 12 Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. March 6 AI as tradecraft: How threat actors operationalize AI Threat actors are operationalizing AI to scale and sustain malicious activity, accelerating tradecraft and increasing risk for defenders, as illustrated by recent activity from North Korean groups such as Jasper Sleet and Coral Sleet (formerly Storm-1877). March 4 Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale Tycoon2FA has become a leading phishing-as-a-service (PhaaS) platforms, enabling campaigns that reach over 500,000 organizations monthly, prompting Microsoft’s Digital Crimes Unit (DCU) to work with Europol and industry partners to facilitate a disruption of Tycoon2FA’s infrastructure and operations. View all threat intelligence Stay ahead of threats Get expert insights, threat intelligence, and the latest cybersecurity reports from Security Insider. See the latest findings AI and machine learning March 16 New Microsoft Purview innovations for Fabric to safely accelerate your AI transformation As organizations adopt AI, security and governance remain core primitives for safe AI transformation and acceleration. March 12 Detecting and analyzing prompt abuse in AI tools Hidden instructions in content can subtly bias AI, and our scenario shows how prompt injection works, highlighting the need for oversight and a structured response playbook. March 9 Secure agentic AI for your Frontier Transformation Learn how Microsoft Agent 365 and Microsoft 365 E7 can help secure your Frontier Transformation. View all AI and machine learning Modernize your security operations center Confidently secure your multicloud, multiplatform environment with Microsoft Sentinel – a cloud-native security information and event management (SIEM) solution. Learn more about Microsoft Sentinel Latest posts March 16 New Microsoft Purview innovations for Fabric to safely accelerate your AI transformation As organizations adopt AI, security and governance remain core primitives for safe AI transformation and acceleration. March 16 Help on the line: How a Microsoft Teams support call led to compromise A DART investigation into a Microsoft Teams voice phishing attack shows how deception and trusted tools can enable identity-led intrusions and how to stop them. March 12 Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. March 12 From transparency to action: What the latest Microsoft email security benchmark reveals The latest Microsoft benchmarking data reveals how Microsoft Defender mitigates modern email threats compared to SEG and ICES vendors. March 12 Detecting and analyzing prompt abuse in AI tools Hidden instructions in content can subtly bias AI, and our scenario shows how prompt injection works, highlighting the need for oversight and a structured response playbook. March 11 Contagious Interview: Malware delivered through fake developer job interviews The Contagious Interview campaign weaponizes job recruitment to target developers. View all latest posts
    💬 Team Notes
    Article Info
    Source
    Microsoft
    Category
    ◉ Threat Intelligence
    Published
    Archived
    Mar 17, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗