26 Agosto 2025
Securing and governing the rise of autonomous agents​​

In this blog, you will hear directly from Corporate Vice President and Deputy Chief Information Security Officer (CISO) for Identity, Igor Sakhnov, about how to secure and govern autonomous agents. This blog is part of a new ongoing series where our Deputy CISOs share their thoughts on what[…]

Read More
21 Agosto 2025
Think before you Click(Fix): Analyzing the ClickFix social engineering technique

Over the past year, Microsoft Threat Intelligence and Microsoft Defender Experts have observed the ClickFix social engineering technique growing in popularity, with campaigns targeting thousands of enterprise and end-user devices globally every day. Since early 2024, we’ve helped multiple customers across various industries address such campaigns attempting to[…]

Read More
20 Agosto 2025
Quantum-safe security: Progress towards next-generation cryptography

Quantum computing promises transformative advancements, yet it also poses a very real risk to today’s cryptographic security. In the future scalable quantum computing could break public-key cryptography methods currently in use and undermine digital signatures, resulting in compromised authentication systems and identity verification. Starting your journey to become[…]

Read More
18 Agosto 2025
Take Charge and Stay Ahead with Power Platform Monitor Alerts

Stop chasing problems and start preventing them. Monitor Alerts flips the script for Power Platform admins. Instead of manually checking dashboards, you can define custom health thresholds and get notifications when apps or flows start slipping. No guesswork, no endless refresh marathons—just proactive control. Built into the Power[…]

Read More
18 Agosto 2025
Dissecting PipeMagic: Inside the architecture of a modular backdoor framework

Among the plethora of advanced attacker tools that exemplify how threat actors continuously evolve their tactics, techniques, and procedures (TTPs) to evade detection and maximize impact, PipeMagic, a highly modular backdoor used by Storm-2460 masquerading as a legitimate open-source ChatGPT Desktop Application, stands out as particularly advanced. Beneath[…]

Read More
14 Agosto 2025
Build and deploy a single-page application in Power Pages using GitHub Spark and Codespaces

GitHub Spark, when used with GitHub Codespaces, provides a robust cloud-based development experience for building sites that can be efficiently hosted as Power Pages single-page applications. By leveraging the Power Platform CLI, you can streamline your workflow and deploy sites with ease. Why Use GitHub Spark + Codespaces[…]

Read More
14 Agosto 2025
Build and Extend Agents Directly from Power Pages Studio (Preview)

We are excited to announce new capabilities in Power Pages that allow makers to create AI agents in Microsoft Copilot Studio directly from Power Pages Studio using a selected form, customize directly in Copilot Studio and use in a Power Pages site, and use a refreshed chat widget[…]

Read More
13 Agosto 2025
Connect with the security community at Microsoft Ignite 2025

In today’s AI-powered world, security professionals are facing unprecedented challenges—and opportunities. As generative AI reshapes the digital landscape, the need for robust, intelligent, and adaptive security strategies has never been more urgent. At Microsoft Ignite 2025, we will showcase end-to-end security innovations and share world-class threat and regulatory intelligence[…]

Read More
12 Agosto 2025
Dow’s 125-year legacy: Innovating with AI to secure a long future

Founded more than 125 years ago, Dow has demonstrated a commitment to leveraging science to make the world a better place. Today, Dow’s ambition to be the most innovative, inclusive, and sustainable materials science company is supported by a global security team dedicated to keeping employees, customers, and[…]

Read More
12 Agosto 2025
Customer Managed Key (CMK) Updates: Enhancing Security, Flexibility, and Global Reach 

We are excited to share the latest developments in Customer Managed Key (CMK) management for Power Platform Environments.  As data security evolves, organizations must keep up with best practices and technology to protect sensitive information. Customer Managed Key (CMK) solutions give organizations direct control over encryption keys, strengthening[…]

Read More