Microsoft recognized as a Leader in IDC MarketScape on application streaming and enterprise browsers

With Cybersecurity month now behind us, you may be ready to take action and invest in your next level of defense. The browser is your most used app – you need the protections and safeguards of a secure enterprise browser. While it can be daunting t

The post Microsoft recognized as a Leader in IDC MarketScape on application streaming and enterprise browsers appeared first on Windows Blog.

Continue reading Microsoft recognized as a Leader in IDC MarketScape on application streaming and enterprise browsers

Microsoft recognized as a Leader in IDC MarketScape on application streaming and enterprise browsers

With Cybersecurity month now behind us, you may be ready to take action and invest in your next level of defense. The browser is your most used app – you need the protections and safeguards of a secure enterprise browser. While it can be daunting t

The post Microsoft recognized as a Leader in IDC MarketScape on application streaming and enterprise browsers appeared first on Microsoft Edge Blog.

Continue reading Microsoft recognized as a Leader in IDC MarketScape on application streaming and enterprise browsers

Beware of double agents: How AI can fortify — or fracture — your cybersecurity

AI is rapidly becoming the backbone of our world, promising unprecedented productivity and innovation. But as organizations deploy AI agents to unlock new opportunities and drive growth, they also face a new breed of cybersecurity threats. There are a lot of Star Trek fans here at Microsoft, including me. One of our engineering leaders gifted…

The post Beware of double agents: How AI can fortify — or fracture — your cybersecurity appeared first on The Official Microsoft Blog.

Continue reading Beware of double agents: How AI can fortify — or fracture — your cybersecurity

Beware of double agents: How AI can fortify — or fracture — your cybersecurity

AI is rapidly becoming the backbone of our world, promising unprecedented productivity and innovation. But as organizations deploy AI agents to unlock new opportunities and drive growth, they also face a new breed of cybersecurity threats. There are a lot of Star Trek fans here at Microsoft, including me. One of our engineering leaders gifted…

The post Beware of double agents: How AI can fortify — or fracture — your cybersecurity appeared first on The Official Microsoft Blog.

Continue reading Beware of double agents: How AI can fortify — or fracture — your cybersecurity

Microsoft offers in-country data processing to 15 countries to strengthen sovereign controls for Microsoft 365 Copilot

Microsoft is pleased to announce that we are making in-country data processing for customers’ Microsoft 365 Copilot interactions available in 15 countries around the world.
The post Microsoft offers in-country data processing to 15 countries to strengt… Continue reading Microsoft offers in-country data processing to 15 countries to strengthen sovereign controls for Microsoft 365 Copilot

​​Learn what generative AI can do for your security operations center

This new e-book showcases what generative AI can do for your SOC, from reducing alert fatigue and enabling quicker triage to getting ahead of cyberattacks with proactive threat hunting, and more.

The post ​​Learn what generative AI can do for your security operations center appeared first on Microsoft Security Blog.

Continue reading ​​Learn what generative AI can do for your security operations center

​​Learn what generative AI can do for your security operations center

This new e-book showcases what generative AI can do for your SOC, from reducing alert fatigue and enabling quicker triage to getting ahead of cyberattacks with proactive threat hunting, and more.

The post ​​Learn what generative AI can do for your security operations center appeared first on Microsoft Security Blog.

Continue reading ​​Learn what generative AI can do for your security operations center

SesameOp: Novel backdoor uses OpenAI Assistants API for command and control

Microsoft Incident Response – Detection and Response Team (DART) researchers uncovered a new backdoor that is notable for its novel use of the OpenAI Assistants Application Programming Interface (API) as a mechanism for command-and-control (C2) communications. Instead of relying on more traditional methods, the threat actor behind this backdoor abuses OpenAI as a C2 channel as a way to stealthily communicate and orchestrate malicious activities within the compromised environment. To do this, a component of the backdoor uses the OpenAI Assistants API as a storage or relay mechanism to fetch commands and run tasks for the threat actor.

The post SesameOp: Novel backdoor uses OpenAI Assistants API for command and control appeared first on Microsoft Security Blog.

Continue reading SesameOp: Novel backdoor uses OpenAI Assistants API for command and control