This is the Trace Id: 3bee7e9a1b7d46c8895923cdf5343e52
Slide %{start} of %{total}. %{slideTitle}
End of highlight section

Latest news

Analyzing CVE-2025-31191: A macOS security-scoped bookmarks-based sandbox escape                                                      

 

Microsoft Threat Intelligence blog | 05/01/2025

Understanding the threat landscape for Kubernetes and containerized assets                                                                           

 

Microsoft Threat Intelligence blog | 04/23/2025

Threat actors misuse Node.js to deliver malware and other malicious payloads                                                                        

 

Microsoft Threat Intelligence blog | 04/15/2025

Communities and support

Two people with one person working on a computer with headphones on

Hear more stories from our threat intelligence community

Join host Sherrod DeGrippo and security experts on the Microsoft Threat Intelligence Podcast, featuring tales of innovation, teamwork, espionage, and cyber threats. Tune in to hear in-depth analyses of Microsoft's influence on the threat landscape and behind the scenes stories from the tireless researchers and analysts that take part.
Corporate employees in a meeting

Get more security insights from our blog community

See the latest news in AI and machine learning, data protection, and digital security with the Microsoft Security blog. Find news and perspectives on legal, public policy, and citizenship topics with the Microsoft on the Issues blog.
User at home casually using computer

Join our threat intelligence community on social

Stay up to date on the latest threat intelligence insights, blogs, and related security news. 

Follow us

OSZAR »