| Website image | URL of site archived | Date archived |
Archive type |
| https://www.microsoft.com/en-us/security/blog/2026/03/02/oauth-redirection-abuse-enables-phishing-malware-delivery/ | Thu, 05 Mar 2026 07:28:18 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2026/02/19/running-openclaw-safely-identity-isolation-runtime-risk/ | Thu, 26 Feb 2026 20:32:27 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2026/02/10/ai-recommendation-poisoning/ | Fri, 20 Feb 2026 18:43:06 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2026/02/03/microsoft-sdl-evolving-security-practices-for-an-ai-powered-world/ | Thu, 19 Feb 2026 23:10:43 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2026/02/02/infostealers-without-borders-macos-python-stealers-and-platform-abuse/ | Thu, 19 Feb 2026 20:23:26 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2026/02/06/active-exploitation-solarwinds-web-help-desk/ | Tue, 10 Feb 2026 17:43:18 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/#storm-2603 | Tue, 10 Feb 2026 17:27:49 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2026/02/05/clickfix-variant-crashfix-deploying-python-rat-trojan/ | Tue, 10 Feb 2026 17:07:20 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2026/01/21/multistage-aitm-phishing-bec-campaign-abusing-sharepoint/ | Tue, 27 Jan 2026 02:50:37 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2026/01/14/inside-redvds-how-a-single-virtual-desktop-provider-fueled-worldwide-cybercriminal-operations/ | Tue, 20 Jan 2026 21:21:52 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2026/01/06/phishing-actors-exploit-complex-routing-and-misconfigurations-to-spoof-domains/ | Sat, 10 Jan 2026 02:09:29 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2024/10/31/chinese-threat-actor-storm-0940-uses-credentials-from-password-spray-attacks-from-a-covert-network/ | Mon, 24 Nov 2025 05:47:07 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2025/04/08/exploitation-of-clfs-zero-day-leads-to-ransomware-activity/ | Wed, 09 Apr 2025 04:13:23 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2025/01/13/analyzing-cve-2024-44243-a-macos-system-integrity-protection-bypass-through-kernel-extensions/ | Mon, 20 Jan 2025 11:46:34 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/ | Thu, 12 Dec 2024 16:34:02 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2018/04/19/introducing-windows-defender-system-guard-runtime-attestation/ (Orig site: https://web.archive.org/web/20241006131949/https://www.microsoft.com/en-us/security/blog/2018/04/19/introducing-windows-defender-system-guard-runtime-attestation/)
| Fri, 06 Dec 2024 02:28:59 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/how-russia-is-trying-to-disrupt-the-2024-paris-olympic-games | Thu, 15 Aug 2024 14:53:50 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/mobile-authenticator-app | Wed, 14 Aug 2024 18:00:11 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/iran-surges-cyber-enabled-influence-operations-in-support-of-hamas | Mon, 20 May 2024 17:20:33 GMT
| Archived webpage |
| https://www.microsoft.com/en-us/security/blog/2023/12/28/financially-motivated-threat-actors-misusing-app-installer/ | Mon, 01 Jan 2024 14:14:10 GMT
| Archived webpage |