惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

博客园 - 司徒正美
aimingoo的专栏
aimingoo的专栏
MongoDB | Blog
MongoDB | Blog
云风的 BLOG
云风的 BLOG
OSCHINA 社区最新新闻
OSCHINA 社区最新新闻
酷 壳 – CoolShell
酷 壳 – CoolShell
博客园 - 聂微东
Y
Y Combinator Blog
T
Tailwind CSS Blog
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报
S
SegmentFault 最新的问题
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
博客园 - 【当耐特】
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
J
Java Code Geeks
美团技术团队
Google DeepMind News
Google DeepMind News
博客园_首页
Apple Machine Learning Research
Apple Machine Learning Research
T
The Blog of Author Tim Ferriss

Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises | CSO Online

Why your AI strategy stops where the PLC starts: Hard lessons from the OT frontlines Identity as the primary attack surface: What modern breaches are really exploiting Google folds CodeMender into agent ecosystem amid push for AI-led AppSec Critical vulnerability in Cisco Secure Workload rated at maximum severity Microsoft patches two zero-day flaws in Defender Unpatched ChromaDB flaw leaves servers open to remote code execution Microsoft releases open-source tools to operationalize AI agent safety AI becoming an SOC imperative for curtailing emerging cyber threats Microsoft is working on a patch for 'YellowKey' attack on Bitlocker, offers temporary fix Drupal admins rushing to patch maximum severity SQL injection vulnerability GitHub admits major source code leak after 3,800 internal repositories breached SHub Reaper impersonates Apple, Google, and Microsoft in one MacOS attack chain Why some security fixes never reach your vulnerability dashboard Microsoft disrupts malware code-signing service used by ransomware gangs Contractor’s public GitHub account exposed GovCloud and CISA credentials AntV data visualization tool the latest to be hit by ongoing npm supply chain attacks GitHub scales back bug bounties, reminds users security is their responsibility too Internet Explorer may be dead, but its ghost still runs malware 7 tips for accelerating cyber incident recovery SIEM-Kaufratgeber Schwachstellen managen: Die besten Vulnerability-Management-Tools Security-Infotainment: Die besten Hacker-Dokus Microsoft May security patch fails for some due to boot partition size glitch AI cyberattackers are getting better faster New image-based prompt injection attack targets multimodal AI models ‘Patched’ Windows bug resurfaces 6 years later as working SYSTEM-level exploit AI coding is fueling a secrets-sprawl crisis few CISOs are containing Why the best security investment a board can make in 2026 isn’t another tool Expired domain leads to supply chain attack on node-ipc npm package Exchange Server zero-day vulnerability can be triggered by opening a malicious email Cisco warns of an actively exploited SD-WAN flaw with max severity Autonomous systems are finally working. Security is next EU’s Cyber Resiliency Act will put IT leaders to the test The economics of ransomware 3.0 AI agent finds 18-year-old remote code execution flaw in Nginx Meet Fragnesia, the third Linux kernel vulnerability in a month FlowerStorm phishing gang adopts virtual-machine obfuscation to evade email defenses PraisonAI vulnerability gets scanned within 4 hours of disclosure What CISOs need to land a board role Fired employee sought AI help to hide deletion of hosting firm’s customer data Fortinet fixes two critical RCE flaws in FortiAuthenticator and FortiSandbox What happens when China’s AI catches up to Mythos? Microsoft’s new AI system finds 16 Windows flaws, including four critical RCEs Palo Alto bets on identity security for autonomous AI with Idira launch ClickFix finds a backup plan in PySoxy proxy chains CISA’s AI SBOM guidance pushes software supply-chain oversight into new territory 2026 CSO Award winners showcase business-enabling cyber innovation Google entdeckt erstmals KI-basierten Zero-Day-Exploit Der Kaufratgeber für Breach & Attack Simulation Tools May Patch Tuesday roundup: Critical holes in Windows Netlogon, DNS, and SAP S/4HANA Mistral AI SDK, TanStack Router hit in npm software supply chain attack OpenAI introduces Daybreak cyber platform, takes on Anthropic Mythos Fake Claude Code takes the IElevator to your browser secrets cPanel flaw exposes enterprises to hosting supply-chain risks Developer workstations are the new beachhead CISOs step into the AI spotlight Why patching SLAs should be the floor, not the strategy Cybersicherheitsvorschriften: So erfüllen Sie Ihre Compliance-Anforderungen Customer Identity & Access Management: Die besten CIAM-Tools Linux kernel maintainers suggest a ‘kill switch’ to protect systems until a zero-day vulnerability is patched Entries now open for the 2026 CSO30 Australia Awards Lyrie.ai Joins First Batch of Anthropic’s Cyber Verification Program Google discovers weaponized zero-day exploits created with AI Malicious Hugging Face model masquerading as OpenAI release hits 244K downloads New ‘Dirty Frag’ exploit targets Linux kernel for root access AI security is repeating endpoint security's biggest mistake 8 guiding principles for reskilling the SOC for agentic AI 1,800+ MCP servers exposed without authentication: How zero trust can secure the AI agent revolution Five new holes, one exploited, found in Ivanti Endpoint Manager Mobile Claude in Chrome is taking orders from the wrong extensions Your CTEM program is probably ignoring MCP. Here’s how to fix it Pen tests show AI security flaws far more severe than legacy software bugs Your refresh plan has a CVE blind spot Become a millionaire by bug hunting on Android 13 new critical holes in JavaScript sandbox allow execution of arbitrary code Ollama vulnerability highlights danger of AI frameworks with unrestricted access LinkedIn illegally blocking free accounts from seeing 'who's viewed your profile' data, group alleges Bots in translation: Can AI really fix SIEM rule sprawl across vendors? Critical Palo Alto Networks software bug hits exposed firewalls CISOs: Align cyber risk communication with boardroom psychology Ten years later, has the GDPR fulfilled its purpose? US government agency to safety test frontier AI models before release Iranian state-backed spies pose as ransomware slingers in false flag attacks New malware turns Linux systems into P2P attack networks Poisoned truth: The quiet security threat inside enterprise AI Train like you fight: Why cyber operations teams need no-notice drills Die besten DAST- & SAST-Tools Supply-chain attacks take aim at your AI coding agents Edge browser leaves passwords exposed in plain text, says researcher CISA mulls new three-day remediation deadline for critical flaws CISA pushes critical infrastructure operators to prepare to work in isolation Oracle will patch more often to counter AI cybersecurity threat AI finds 20-year-old bugs in PostgreSQL and MariaDB Stealthy malware abuses Microsoft Phone Link to siphon SMS OTPs from enterprise PCs CISOs step up to the security workforce challenge Why most zero-trust architectures fail at the traffic layer 10 Anzeichen für einen schlechten CSO Anthropic Mythos spurs White House to weigh pre-release reviews for high-risk AI models The Winter Games effect: When gold meets DDoS How orphaned applications are quietly fueling your shadow IT problem
Microsoft says it's making AI 'safe for work' in your browser
2026-05-22 · via Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises | CSO Online

Microsoft is testing the addition of agentic AI to its corporate browser, Edge for Business. A new version, currently available in a limited preview, will help perform routine tasks more efficiently, according to Microsoft’s partner product manager for Edge, Lindsay Kubasik.

Agentic AI will help with completing multi-step tasks such as filling in forms, navigating sites, or gathering information from different tabs, all using enterprise-managed tools, the company said.

And a new tab page will pull together calendar entries, files and Copilot prompts, reducing the need to switch between tools, it said.

A key feature of the new browser version will be its ability to protect corporate data. Enterprises will be able to block the use of copy and paste, and all AI prompts and responses will stay within their Microsoft 365 tenant and will not be used to train models, the company said. They will also be able to audit prompts and block sensitive uploads. The protections will apply as soon as users sign into Edge for Business.

Enterprises will be able to keep track of users who are not following policy: Microsoft’s compliance tool, Purview, will analyze all file uploads to check for sensitive data being uploaded. Enterprises will then have the ability to block the action.

To access the new features, enterprises must sign up for the limited preview.

SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.