Skip to content
TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

Windows Defender ATP

  • Home
  • Windows Defender ATP
Posted incybersecurity Microsoft O365

Office Application Guard ! Game changing Defender ATP

Virtual Sand boxing Microsoft announced on Monday that Microsoft Defender Application Guard for Office is now at the public preview stage. The solution, also called "Application Guard for Office," adds…
Posted by PravinKarthik August 26, 2020
Posted incybersecurity Malware Security

Defender ATP Block Mode 🛡️⚔️

It's called “endpoint detection and response (EDR) in block mode,” the capability is meant to provide post-breach blocking of malware and other malicious behaviors, by taking advantage of Microsoft Defender…
Posted by PravinKarthik August 20, 2020
Posted inSecurity

Windows Defender now defends firmware filesystem

Protection feature against unwanted apps is now available to all Windows 10 usersMicrosoft has been building firmware-level defenses into Windows 10 Secured-Core PCs for the enterprise, and now it's bringing…
Posted by PravinKarthik June 19, 2020
Trending post
  • CISSP Executive Briefing: Security Drift
    CISSP Executive Briefing: Security Drift
  • Fox Tempest Takedown — Microsoft DCU Dismantles Malware-Signing Service Operation
    Fox Tempest Takedown — Microsoft DCU Dismantles Malware-Signing Service Operation
  • CISSP Domain 7: Zero Hour Exam Cram Series
    CISSP Domain 7: Zero Hour Exam Cram Series
  • CVE-2026-20223 — Cisco Secure Workload Authentication Bypass
    CVE-2026-20223 — Cisco Secure Workload Authentication Bypass
  • CISA adds Seven Vulnerabilities to KEV Catalog
    CISA adds Seven Vulnerabilities to KEV Catalog
  • AI Security Posture Management: The Visibility Layer Every Enterprise Is Missing
    AI Security Posture Management: The Visibility Layer Every Enterprise Is Missing
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top