Tech News

RSS CVE Feed

RSS Microsoft Security

  • New Microsoft e-book: 3 reasons point solutions are holding you back December 18, 2025
    Explore the new Microsoft e-book on how a unified, AI-ready platform delivers speed, resilience, and measurable security gains. The post New Microsoft e-book: 3 reasons point solutions are holding you back appeared first on Microsoft Security Blog.
    Scott Woodgate
  • Access Fabric: A modern approach to identity and network access December 17, 2025
    An Access Fabric is a unified access security solution that continuously decides who can access what, from where, and under what conditions—in real time. The post Access Fabric: A modern approach to identity and network access appeared first on Microsoft Security Blog.
    Igor Sakhnov
  • Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components December 15, 2025
    CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is a critical pre-authentication remote code execution (RCE) vulnerability affecting React Server Components and related frameworks. The post Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components appeared first on Microsoft Security Blog.
    Microsoft Defender Security Research Team
  • Microsoft named an overall leader in KuppingerCole Leadership Compass for Generative AI Defense December 15, 2025
    Today, we are proud to share that Microsoft has been recognized as an overall leader in the KuppingerCole Leadership Compass for Generative AI Defense. The post Microsoft named an overall leader in KuppingerCole Leadership Compass for Generative AI Defense appeared first on Microsoft Security Blog.
    Herain Oberoi
  • Imposter for hire: How fake people can gain very real access December 11, 2025
    Fake employees are an emerging cybersecurity threat. Learn how they infiltrate organizations and what steps you can take to protect your business. The post Imposter for hire: How fake people can gain very real access appeared first on Microsoft Security Blog.
    Microsoft Incident Response