17 Dicembre 2025
[Launched] Generally Avaailable: Azure SQL updates for early December 2025

In mid-December 2025, the following updates and enhancements were made to Azure SQL: Identify causes that auto-resume serverless workloads using Activity Log in Azure SQL Database to troubleshoot and optimize access patterns. Learn more. Source: Microsoft Azure – aggiornamenti

Read More
17 Dicembre 2025
Access Fabric: A modern approach to identity and network access

Today, most organizations use multiple identity systems and multiple network access solutions from multiple vendors. This happens, either intentionally or organically, when different areas of a company choose different tools, creating a fragmented environment that leaves weaknesses that cyberattackers are quick to weaponize. Get unified identity and network[…]

Read More
16 Dicembre 2025
[In preview] Public Preview: Azure NetApp Files advanced ransomware protection

Azure NetApp Files advanced ransomware protection (ANF ARP) is now in Public Preview. ANF ARP is designed to help organizations proactively detect, respond to, and recover from ransomware threats on cloud volumes. ANF ARP monitors Azure NetApp Files volu Source: Microsoft Azure – aggiornamenti

Read More
16 Dicembre 2025
[In preview] Generally Available: Azure NetApp Files cross-zone-region replication (CZRR)

Cross-zone-region replication builds on the existing capabilities of cross-region replication and cross-zone replication. It enables you to replicate volumes across regions and across availability zones within the same region, combining disaster recovery Source: Microsoft Azure – aggiornamenti

Read More
15 Dicembre 2025
Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components

CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is a critical pre-authentication remote code execution (RCE) vulnerability affecting React Server Components, Next.js, and related frameworks. With a CVSS score of 10.0, this vulnerability could allow attackers to execute arbitrary code on vulnerable[…]

Read More