thumbnail Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption | Microsoft Security Blog
thumbnail Microsoft profiles new threat group with unusual but effective practices
thumbnail Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction