Microsoft Security Blog Expert coverage of cybersecurity topics
- Microsoft recognized as a Leader in The Forrester Wave™ for Workforce Identity Security Platformsby Nadim Abdo on May 22, 2026 at 5:00 pm
Microsoft has been recognized as a Leader in The Forrester Wave™: Workforce Identity Security Platforms, Q2 2026, receiving the highest scores in both the current offering and strategy categories. The post Microsoft recognized as a Leader in The Forrester Wave™ for Workforce Identity Security Platforms appeared first on Microsoft Security Blog.
- From edge appliance to enterprise compromise: Multi-stage Linux intrusion via F5 and Confluenceby Microsoft Defender Security Research Team on May 22, 2026 at 4:53 pm
A multi-stage attack on Linux devices began with an exposed F5 BIG-IP edge appliance and pivoted to an internal Confluence server for credential theft and identity compromise. Learn how the threat actor attempted Kerberos relay and lateral movement, and how Microsoft Defender detected, blocked, and unraveled the attack. The post From edge appliance to enterprise compromise: Multi-stage Linux intrusion via F5 and Confluence appeared first on Microsoft Security Blog.
- Microsoft Security success stories: How St. Luke’s and ManpowerGroup are securing AI foundationsby Steve Dispensa on May 22, 2026 at 4:00 pm
How Frontier firms secure AI at scale: read how Microsoft customers embed governance, identity, and cloud security to make protection an enabler of AI growth. The post Microsoft Security success stories: How St. Luke’s and ManpowerGroup are securing AI foundations appeared first on Microsoft Security Blog.
- What’s new in Microsoft Security: May 2026by Alym Rayani on May 21, 2026 at 4:00 pm
Microsoft Security’s latest updates extend visibility, control, and protection across expanding ecosystems as organizations accelerate AI adoption. The post What’s new in Microsoft Security: May 2026 appeared first on Microsoft Security Blog.
- Mini Shai Hulud: Compromised @antv npm packages enable CI/CD credential theftby Microsoft Defender Security Research Team on May 20, 2026 at 5:48 pm
Compromised @antv npm packages deploy the Mini Shai-Hulud payload to steal CI/CD secrets from Linux-based automation environments. The malware executes during npm install and targets credentials across GitHub, AWS, Kubernetes, Vault, npm, and 1Password platforms. The post Mini Shai Hulud: Compromised @antv npm packages enable CI/CD credential theft appeared first on Microsoft Security Blog.
- Securing the gaming culture of culturesby Aaron Zollman on May 20, 2026 at 4:00 pm
Read about the unique challenges and rewards of securing gaming platforms and how to better protect gaming communities. The post Securing the gaming culture of cultures appeared first on Microsoft Security Blog.
- Introducing RAMPART and Clarity: Open source tools to bring safety into Agent development workflowby Ram Shankar Siva Kumar on May 20, 2026 at 3:00 pm
The AI systems shipping inside enterprises today are fundamentally different from the ones we were building even two years ago, because they have moved well past answering questions and into accessing your email, retrieving records from your CRM, writing and executing code, and taking actions on your behalf across dozens of connected systems. The post Introducing RAMPART and Clarity: Open source tools to bring safety into Agent development workflow appeared first on Microsoft Security Blog.
- Exposing Fox Tempest: A malware-signing service operationby Microsoft Threat Intelligence on May 19, 2026 at 3:07 pm
Fox Tempest is a financially motivated threat actor operating a malware‑signing‑as‑a‑service (MSaaS) used by other cybercriminals, including Vanilla Tempest and Storm groups, to more effectively distribute malicious code, including ransomware. The post Exposing Fox Tempest: A malware-signing service operation appeared first on Microsoft Security Blog.
- How Storm-2949 turned a compromised identity into a cloud-wide breachby Microsoft Defender Security Research Team on May 18, 2026 at 10:42 pm
Storm-2949 turned stolen credentials into a cloud-wide breach, moving from identity compromise to large-scale data theft without using malware. This incident shows how threat actors can exploit trusted systems to operate undetected. The post How Storm-2949 turned a compromised identity into a cloud-wide breach appeared first on Microsoft Security Blog.
- How to better protect your growing business in an AI-powered worldby Alym Rayani on May 18, 2026 at 4:00 pm
See how built-in security helps keep your growing business running, protect customer trust, and support growth. The post How to better protect your growing business in an AI-powered world appeared first on Microsoft Security Blog.













