並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 9 件 / 9件

新着順 人気順

https account microsoft com services microsoft365 installの検索結果1 - 9 件 / 9件

  • GitHub - modelcontextprotocol/servers: Model Context Protocol Servers

    Official integrations are maintained by companies building production ready MCP servers for their platforms. 21st.dev Magic - Create crafted UI components inspired by the best 21st.dev design engineers. 2slides - An MCP server that provides tools to convert content into slides/PPT/presentation or generate slides/PPT/presentation with user intention. ActionKit by Paragon - Connect to 130+ SaaS inte

      GitHub - modelcontextprotocol/servers: Model Context Protocol Servers
    • DEV-0537 criminal actor targeting organizations for data exfiltration and destruction | Microsoft Security Blog

      April 2023 update – Microsoft Threat Intelligence has shifted to a new threat actor naming taxonomy aligned around the theme of weather. DEV-0537 is now tracked as Strawberry Tempest. To learn about how the new taxonomy represents the origin, unique traits, and impact of threat actors, and to get a complete mapping of threat actor names, read this blog: Microsoft shifts to a new threat actor namin

        DEV-0537 criminal actor targeting organizations for data exfiltration and destruction | Microsoft Security Blog
      • Microsoft SharePoint RCE bug exploited to breach corporate network

        HomeNewsSecurityMicrosoft SharePoint RCE bug exploited to breach corporate network A recently disclosed Microsoft SharePoint remote code execution (RCE) vulnerability tracked as CVE-2024-38094 is being exploited to gain initial access to corporate networks. CVE-2024-38094 is a high-severity (CVSS v3.1 score: 7.2) RCE flaw impacting Microsoft SharePoint, a widely used web-based platform functioning

          Microsoft SharePoint RCE bug exploited to breach corporate network
        • The Cost of a Call: From Voice Phishing to Data Extortion | Google Cloud Blog

          Google Threat IntelligenceVisibility and context on the threats that matter most. Contact Us & Get a Demo Update (August 8): Google has completed its email notifications to those affected by this incident. Update (August 8): Emails are actively being sent to those affected by this incident. Another update will be posted here once these alerts have been issued. Update (August 5) In June, one of Goo

            The Cost of a Call: From Voice Phishing to Data Extortion | Google Cloud Blog
          • Microsoft Learn Docs の公式 MCP サーバーを試す

            先日、Microsoft の公式ドキュメントを検索するためのオフィシャル MCP サーバー (Microsoft Learn Docs MCP Server) が公開されました。自分のような Azure ユーザーには大変嬉しい発表です。 ただ、具体的な実装とアーキテクチャは公開されておらず、どんな動作をするのか未知な部分があります。そこで、本記事では Microsoft Learn Docs MCP Server を使ってみてわかったことを少しまとめてみました。 なお、読者には MCP の基礎知識があることを前提にしています。MCP について知りたい場合は、次のような文献をあたってみてください。 Introduction - Model Context Protocol mcp-for-beginners/translations/ja/README.md at main · micros

              Microsoft Learn Docs の公式 MCP サーバーを試す
            • Guidance for investigating attacks using CVE-2023-23397 | Microsoft Security Blog

              February 15, 2024 update – On January 20, 2024, the US government conducted a disruption operation against infrastructure used by a threat actor we track as Forest Blizzard (STRONTIUM), a Russian state-sponsored threat actor, as detailed here: https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian December 4, 2023 update – Microsoft has ide

                Guidance for investigating attacks using CVE-2023-23397 | Microsoft Security Blog
              • Defeating Adversary-in-the-Middle phishing attacks | Microsoft Community Hub

                Adversary-in-the-Middle phishing attacks are on the rise. Here’s how to reduce your risk. Welcome to the second in our series of articles on dealing with advanced identity-related attacks. As we’ve crossed the threshold of more than 40% of users employing multifactor authentication (MFA), we see two trends emerging. The first is that adversaries are successfully compromising a higher percentage of

                  Defeating Adversary-in-the-Middle phishing attacks | Microsoft Community Hub
                • Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself | Microsoft Security Blog

                  April 2023 update – Microsoft Threat Intelligence has shifted to a new threat actor naming taxonomy aligned around the theme of weather. To learn more about this evolution, how the new taxonomy represents the origin, unique traits, and impact of threat actors, and a complete mapping of threat actor names, read this blog: Microsoft shifts to a new threat actor naming taxonomy. September 2022 update

                    Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself | Microsoft Security Blog
                  • Kubernetes

                    No results found. Try a different search term, or use our global search. Overview Get started Implementation guides Overview Secure your Internet traffic and SaaS apps ↗ Replace your VPN ↗ Deploy clientless access ↗ Secure Microsoft 365 email with Email security ↗ Holistic AI security with Cloudflare One ↗ Insights Overview Analytics overview Dashboards Overview Access event analytics Gateway anal

                      Kubernetes
                    1