Tech News

RSS CVE Feed

RSS Microsoft Security

  • Threat modeling AI applications February 26, 2026
    AI threat modeling helps teams identify misuse, emergent risk, and failure modes in probabilistic and agentic AI systems. The post Threat modeling AI applications appeared first on Microsoft Security Blog.
    Scott Christiansen, Alyssa Ofstein and Neil Coles
  • Developer-targeting campaign using malicious Next.js repositories February 24, 2026
    A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard build workflows. The activity demonstrates how staged command-and-control can hide inside routine development tasks. The post Developer-targeting campaign using malicious Next.js repositories appeared first on Microsoft Security Blog.
    Microsoft Defender Experts and Microsoft Defender Security Research Team
  • Scaling security operations with Microsoft Defender autonomous defense and expert-led services February 24, 2026
    AI-powered cyberattacks outpace aging SOC tools, and this new guide explains why manual defense fails and how autonomous, expert-led security transforms modern protection. The post Scaling security operations with Microsoft Defender autonomous defense and expert-led services appeared first on Microsoft Security Blog.
    Andrew Conway
  • New e-book: Establishing a proactive defense with Microsoft Security Exposure Management February 19, 2026
    Read the new maturity-based guide that helps organizations move from fragmented, reactive security practices to a unified exposure management approach that enables proactive defense. The post New e-book: Establishing a proactive defense with Microsoft Security Exposure Management appeared first on Microsoft Security Blog.
    Adi Shua Zucker
  • Running OpenClaw safely: identity, isolation, and runtime risk February 19, 2026
    Self-hosted agents execute code with durable credentials and process untrusted input. This creates dual supply chain risk, where skills and external instructions converge in the same runtime. As OpenClaw-like systems enter enterprises, governance and runtime isolation become critical. The post Running OpenClaw safely: identity, isolation, and runtime risk appeared first on Microsoft Security Blog.
    Microsoft Defender Security Research Team