Security Response (@msftsecresponse) 's Twitter Profile
Security Response

@msftsecresponse

We are the Microsoft Security Response Center. To report security vulnerabilities or abuse in Microsoft products, visit microsoft.com/en-us/msrc.

ID: 116285769

linkhttps://msrc.microsoft.com/blog/ calendar_today21-02-2010 22:15:56

2,2K Tweet

147,147K Takipçi

182 Takip Edilen

Security Response (@msftsecresponse) 's Twitter Profile Photo

Ann Johnson, CVP and Deputy CISO Ann Johnson, Microsoft, and Sherrod DiGrippo 💻 Sherrod DeGrippo 🛸, Director of Threat Intelligence Strategy, Microsoft Threat Intelligence delivered an inspiring keynote at Black Hat, celebrating the incredible work of the defender community. Ann shared her experience

Ann Johnson, CVP and Deputy CISO <a href="/ajohnsocyber/">Ann Johnson</a>, Microsoft, and Sherrod DiGrippo <a href="/sherrod_im/">💻 Sherrod DeGrippo 🛸</a>, Director of Threat Intelligence Strategy, <a href="/MsftSecIntel/">Microsoft Threat Intelligence</a> delivered an inspiring keynote at Black Hat, celebrating the incredible work of the defender community.

Ann shared her experience
Security Response (@msftsecresponse) 's Twitter Profile Photo

MSRC reviews every vulnerability reported to Microsoft. While fixing a large volume of vulnerabilities helps keep customers secure, it also poses numerous practical challenges in prioritizing the most critical bugs. During his Black Hat talk, MSRC Security Engineer Bill Demirkapi

MSRC reviews every vulnerability reported to Microsoft. While fixing a large volume of vulnerabilities helps keep customers secure, it also poses numerous practical challenges in prioritizing the most critical bugs. During his Black Hat talk, MSRC Security Engineer Bill Demirkapi
Security Response (@msftsecresponse) 's Twitter Profile Photo

Thank you to everyone who attended the MSRC Researcher Celebration at #BHUSA last night. Your commitment to "Security Above All Else" is what drives our community forward. We hope you had the opportunity to network, learn, and connect with others who share your passion. A special

Thank you to everyone who attended the MSRC Researcher Celebration at #BHUSA last night. Your commitment to "Security Above All Else" is what drives our community forward. We hope you had the opportunity to network, learn, and connect with others who share your passion. A special
Security Response (@msftsecresponse) 's Twitter Profile Photo

Thank you to the amazing security research community for connecting with us at DEF CON and Black Hat ! We enjoyed our conversations with you all. Want to continue the conversations with the security community? Submit a paper to present at #BlueHat in October:

Thank you to the amazing security research community for connecting with us at <a href="/defcon/">DEF CON</a> and <a href="/BlackHatEvents/">Black Hat</a> ! We enjoyed our conversations with you all.

Want to continue the conversations with the security community? Submit a paper to present at #BlueHat in October:
Security Response (@msftsecresponse) 's Twitter Profile Photo

Security updates for August 2024 are now available. Details are available here: msft.it/60119yPTS #PatchTuesday #SecurityUpdateGuide

Security updates for August 2024 are now available. Details are available here: msft.it/60119yPTS 

#PatchTuesday #SecurityUpdateGuide
Security Response (@msftsecresponse) 's Twitter Profile Photo

Attention everyone in the security community: We want YOU to present at #BlueHat 2024. Submit your paper by August 30th for consideration. Learn more in our blog post: msrc.microsoft.com/blog/2024/08/a…

Microsoft BlueHat (@msftbluehat) 's Twitter Profile Photo

The #BlueHat 2024 Call for Papers is closing soon! You have until August 30th to submit your proposals for 45-minute Breakout Sessions or 15-minute Lightning Talks. Don't miss this chance to share your findings, new ideas, and best practices at BlueHat 2024, happening on October

Security Response (@msftsecresponse) 's Twitter Profile Photo

Microsoft identified North Korean threat actor Citrine Sleet exploiting CVE-2024-7971 in Chromium for RCE. Details on TTPs, mitigations, and IOCs in our blog below:

Microsoft BlueHat (@msftbluehat) 's Twitter Profile Photo

🚨 The Call for Papers deadline has been extended by popular demand to Friday, September 6, 2024. We can’t wait to review your submissions - don't miss out! #infosec #cybersecurity

Security Response (@msftsecresponse) 's Twitter Profile Photo

Security updates for September 2024 are now available. Details are available here: msft.it/60119yPTS #PatchTuesday #SecurityUpdateGuide

Security updates for September 2024 are now available. Details are available here: msft.it/60119yPTS

#PatchTuesday #SecurityUpdateGuide
Security Response (@msftsecresponse) 's Twitter Profile Photo

Today at the Microsoft STRIKE event: “STRIKE Live: Practical AI Safety and Security,” Eric Douglas, CVP, Security Research, Microsoft, gave the opening remarks, and Yonatan Zunger, CVP, AI Safety and Security, Microsoft, delivered the keynote to a large group of Microsoft

Today at the Microsoft STRIKE event: “STRIKE Live: Practical AI  Safety and Security,” Eric Douglas, CVP, Security Research, Microsoft, gave the opening remarks, and Yonatan Zunger, CVP, AI Safety and Security, Microsoft, delivered the keynote to a large group of Microsoft
Security Response (@msftsecresponse) 's Twitter Profile Photo

The #BlueHat 2024 application to attend is open! Don't miss your chance to join us in Redmond, Washington on October 29-30. Apply now!