The next chapter of the Microsoft Security Response Center’s (MSRC) BlueHat security conference is fast approaching. BlueHat Asia 2025 will take place in Bengaluru, India, on November 5 – 6, 2025 and the Call for Papers is now open. Submissions will be accepted through September 14, 2025. Now in its third decade, BlueHat is more than a conference, it’s a community.| 2025 on Microsoft Security Response Center
At Microsoft, securing the ecosystem means more than just fixing bugs—it means proactively hunting for variant classes, identifying systemic weaknesses, and working across teams to protect customers before attackers ever get the chance. This blog highlights one such effort: a deep dive into the risks of misconfigured postMessage handlers across Microsoft services and how MSRC worked with engineering teams to mitigate them.| 2025 on Microsoft Security Response Center
We’re excited to announce significant updates to the Microsoft .NET Bounty Program. These changes expand the program’s scope, simplify the award structure, and offer great incentives for security researchers. The .NET Bounty Program now offers awards up to $40,000 USD for vulnerabilities impacting the .NET and ASP.NET Core (including Blazor and Aspire).| 2025 on Microsoft Security Response Center
本ブログは .NET Bounty Program now offers up to $40,000 in awards の抄訳版です。 最新の情報は原文を参照してください。 Microsoft .NET に関連した報奨金| 2025 on Microsoft Security Response Center
本ブログは Zero Day Quest 2025: $1.6 million awarded for vulnerability research の抄訳版です。最新の情報は原文を参照してください。 今月、Microso| 2025 on Microsoft Security Response Center
Zero Day Quest 2025: $1.6 million awarded for vulnerability research| msrc.microsoft.com
2025 年 8 月 12 日 (米国時間) 、マイクロソフトは、マイクロソフト製品に影響する脆弱性を修正するために、セキ| 2025 on Microsoft Security Response Center
本ブログは Zero Day Quest: Join the largest hacking event with up to $5 million in total bounty awards の抄訳版です。最新の情報は原文を参照してください。 昨年、| 2025 on Microsoft Security Response Center
本ブログは Microsoft Bounty Program year in review: $17 million in rewards の抄訳版です。最新の情報は原文を参照してください。 今年、マイクロソフト| 2025 on Microsoft Security Response Center
マイクロソフトが間接プロンプト インジェクション攻撃を防ぐ方法| msrc.microsoft.com
We’re thrilled to share that this year, the Microsoft Bounty Program has distributed $17 million to 344 security researchers from 59 countries, the highest total bounty awarded in the program’s history. In close collaboration with the Microsoft Security Response Center (MSRC), these security researchers have helped identify and resolve more than a thousand potential vulnerabilities, strengthening protections for Microsoft customers around the world.| Microsoft Security Response Center
Zero Day Quest: Join the largest hacking event with up to $5 million in total bounty awards| msrc.microsoft.com
| msrc.microsoft.com
Summary The growing adoption of large language models (LLMs) in enterprise workflows has introduced a new class of adversarial techniques: indirect prompt injection. Indirect prompt injection can be used against systems that leverage large language models (LLMs) to process untrusted data. Fundamentally, the risk is that an attacker could provide specially crafted data that the LLM misinterprets as instructions.| 2025 on Microsoft Security Response Center
SharePoint の脆弱性 CVE-2025-53770 に関するお客様向けガイダンス| msrc.microsoft.com
Customer guidance for SharePoint vulnerability CVE-2025-53770| msrc.microsoft.com
The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers through discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s Most Valuable Researchers (MVRs), based on the total number of points earned for each valid report.| 2025 on Microsoft Security Response Center
2025 年 7 月 8 日 (米国時間) 、マイクロソフトは、マイクロソフト製品に影響する脆弱性を修正するために、セキ| 2025 on Microsoft Security Response Center
動的アプリケーションセキュリティテスト (DAST) の拡張について| msrc.microsoft.com
Congratulations to all the researchers recognized in this quarter’s Microsoft Researcher Recognition Program leaderboard! Thank you to everyone for your hard work and continued partnership to secure customers. The top three researchers of the 2025 Q2 Security Researcher Leaderboard are wkai, Brad Schlintz (nmdhkr), and 0x140ce! Check out the full list of researchers recognized this quarter here.| Microsoft Security Response Center
Rising star: Meet Dylan, MSRC’s youngest security researcher| msrc.microsoft.com
RedirectionGuard: Mitigating unsafe junction traversal in Windows| msrc.microsoft.com
2025 年 6 月のセキュリティ更新プログラム (月例)| msrc.microsoft.com
2025 年 5 月のセキュリティ更新プログラム (月例)| msrc.microsoft.com
Congratulations to the Top MSRC 2025 Q1 Security Researchers!| msrc.microsoft.com
| msrc.microsoft.com
| msrc.microsoft.com
2025 年 4 月のセキュリティ更新プログラム (月例)| msrc.microsoft.com
あなたが思うより、ジェイルブレイクは簡単| msrc.microsoft.com
Announcing the winners of the Adaptive Prompt Injection Challenge (LLMail-Inject)| msrc.microsoft.com
2025 年 1 月のセキュリティ更新プログラム (月例)| msrc.microsoft.com