28 Luglio 2025
Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability

Microsoft Threat Intelligence has discovered a macOS vulnerability that could allow attackers to steal private data of files normally protected by Transparency, Consent, and Control (TCC), such as files in the Downloads folder, as well as caches utilized by Apple Intelligence. While similar to prior TCC bypasses like[…]

Read More
22 Luglio 2025
Microsoft Sentinel data lake: Unify signals, cut costs, and power agentic AI

You can’t protect what you can’t see. Security operations teams have long been faced with the challenge of managing massive, fast-growing datasets, and the cost of scaling traditional data management tools to handle these data volumes has become unsustainable. We’re evolving our industry-leading Security Incidents and Event Management[…]

Read More
22 Luglio 2025
Disrupting active exploitation of on-premises SharePoint vulnerabilities

On July 19, 2025, Microsoft Security Response Center (MSRC) published a blog addressing active attacks against on-premises SharePoint servers that exploit CVE-2025-49706, a spoofing vulnerability, and CVE-2025-49704, a remote code execution vulnerability. These vulnerabilities affect on-premises SharePoint servers only and do not affect SharePoint Online in Microsoft 365.[…]

Read More
22 Luglio 2025
Visualize with Copilot now allows you to save your chart

Understanding your business data shouldn’t be a one-time effort, it should be part of your everyday decision-making flow. With Visualize with Copilot, we introduced a faster way to uncover insights using AI-generated charts. Now, we’re taking it a step further. You can save the AI-generated visualizations directly within[…]

Read More
22 Luglio 2025
Enhance Power Pages site security with Bot Protection and Managed Rules configuration

As part of our ongoing commitment to elevate securing Power Pages, we’re excited to announce the release of Azure managed Bot Protection rule designed to help safeguard sites against automated threats like credential stuffing, spam, and scraping attacks. Bot Protection Rule The Bot Protection rule adds a layer[…]

Read More
21 Luglio 2025
Take Control of Agent Costs 

As organizations accelerate their adoption of agents to automate tasks, enhance productivity, and deliver new customer experiences, they often face a critical new challenge: unpredictable costs. While consumption-based billing models like pay-as-you-go (PAYG) and prepaid message packs offer flexibility and agility, they can also introduce unexpected charges, budget[…]

Read More
21 Luglio 2025
Introducing the new Power Apps: Generative power meets enterprise-grade trust

Today, we’re taking another big leap forward in applying AI to the future of app development: you can now work with agents to generate code directly in Microsoft Power Apps. This brings the speed and flexibility of vibe coding together with the connectivity, security, and scale of a[…]

Read More
18 Luglio 2025
Microsoft at Black Hat USA 2025: A unified approach to modern cyber defense

Microsoft will be at Black Hat USA 2025, August 5–7 in Las Vegas, and we’re bringing you a unified, practitioner-driven experience built around real-world insights, threat intelligence, incident response, and hands-on AI expertise.We believe security teams are strongest when intelligence, tools, and deep expertise come together. At Microsoft,[…]

Read More
17 Luglio 2025
Transparency on Microsoft Defender for Office 365 email security effectiveness

In today’s world, cyberattackers are relentless. They are often well-resourced, highly sophisticated, and constantly innovating, which means the effectiveness of cybersecurity solutions must be continuously evaluated, not assumed. Yet, despite the critical role email security plays in protecting organizations, there is limited transparency and standardization in how email[…]

Read More
16 Luglio 2025
Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms

Since 2022, the number of human-operated ransomware-linked encounters by organizations surged by 2.75x. Yet, Microsoft Defender for Endpoint has outpaced this rise, reducing the number of successful attacks by 3x, proving its power to turn the tide against evolving cyberthreats.1 Defender for Endpoint’s ability to disrupt ransomware at[…]

Read More