Microsoft Threat Intelligence has observed financially motivated threat actor Storm-0501 continuously evolving their campaigns to achieve sharpened focus on cloud-based[…]
Read MoreAmidst the backdrop of a surging number of ransomware campaigns worldwide, organizations have increasingly chosen Microsoft Defender’s endpoint security as[…]
Read MoreTo align with security best practices, Entra ID and RBAC support is now generally available for the following APIs for[…]
Read MoreAnnouncing the public preview of custom block response code and body for WAF integrated with Application Gateway.Azure WAF integrated with[…]
Read MoreAzure NetApp Files short-term clones enable space-efficient, instant read/write access to data by creating temporary thin clones from existing volume[…]
Read MoreAzure CNI Overlay with Application Gateway for Containers and AGIC is now generally available.Azure CNI Overlay enables AKS clusters to[…]
Read More