Ultimi Aggiornamenti di Cybersecurity

80% of Fortune 500 use active AI Agents: Observability, governance, and security shape the new frontier

Today, Microsoft is releasing the new Cyber Pulse report to provide leaders with straightforward, practical insights and guidance on new[…]

Leggi di più
Manipulating AI memory for profit: The rise of AI Recommendation Poisoning

That helpful “Summarize with AI” button? It might be secretly manipulating what your AI recommends.  Microsoft security researchers have discovered a[…]

Leggi di più
A one-prompt attack that breaks LLM safety alignment

Large language models (LLMs) and diffusion models now power a wide range of applications, from document assistance to text-to-image generation, and users[…]

Leggi di più
Analysis of active exploitation of SolarWinds Web Help Desk

The Microsoft Defender Research Team observed a multi‑stage intrusion where threat actors exploited internet‑exposed SolarWinds Web Help Desk (WHD) instances to[…]

Leggi di più
New Clickfix variant ‘CrashFix’ deploying Python Remote Access Trojan

In January 2026, Microsoft Defender Experts identified a new evolution in the ongoing ClickFix campaign. This updated tactic deliberately crashes[…]

Leggi di più
Announcing the public preview of the new usage page in the Power Platform admin center

Today, we’re excited to announce that the new usage page in the Power Platform admin center (PPAC) is available in[…]

Leggi di più
Build Agent 365-ready Adaptive Intelligence with Work IQ and Dataverse

What if your AI agents truly understood your business—your data, your workflows, your goals—and IT could still govern them at[…]

Leggi di più
Breaking down the facts about secure development with Power Platform

Today, organizations are being measured by how quickly they can innovate. Whether it’s launching new digital experiences, streamlining operations, or[…]

Leggi di più
Power Pages Client API (Preview): Native Client-Side Library for Forms and Data

When building advanced, data‑driven sites on Power Pages, developers often encounter limitations and fragility in standard DOM manipulation. Relying on[…]

Leggi di più
New Microsoft e-book: 3 reasons point solutions are holding you back

While patchwork tools slow defenders down and impact visibility into potential cyberthreats, they’re an unfortunate reality for many organizations. As[…]

Leggi di più
Access Fabric: A modern approach to identity and network access

Today, most organizations use multiple identity systems and multiple network access solutions from multiple vendors. This happens, either intentionally or[…]

Leggi di più
Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components

CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is a critical pre-authentication remote code[…]

Leggi di più