News

Explore how leading organizations are using AI to drive innovation and achieve tangible results in a transformative business ...
Microsoft Threat Intelligence has observed remote IT workers deployed by North Korea leveraging AI to improve the scale and ...
As threat actors are adopting Rust for malware development, RIFT, an open-source tool, helps reverse engineers analyze Rust ...
In this blog you will hear directly from Microsoft’s Deputy Chief Information Security Officer (CISO) for Customer Security, Ann Johnson, about the need for proactive planning in cyber incidents, ...
You can now work with a team of agents to define requirements, map processes, create data models, and architect multiple components of a solution to work together. Whether you’re expanding on existing ...
Microsoft Build 2025 is here—our annual showcase of the most exciting innovations shaping the future of development and AI. For engineers, makers, and subject matter experts, it’s the moment to see ...
Since April 2024, the threat actor that Microsoft Threat Intelligence tracks as Marbled Dust has been observed exploiting user accounts that have not applied fixes to a zero-day vulnerability ...
We’re excited to announce Copilot Chat and Microsoft 365 Copilot availability for students aged 13 and older is coming this summer with enterprise data protection and IT controls. AI provides new and ...
Looking for how Microsoft is empowering students at school? With your school accounts, students may also have access to Microsoft 365 Copilot Chat and Microsoft 365 Copilot. Copilot Chat offers free, ...
Microsoft launched its Cybersecurity Governance Council in 2024, and with it, named a group of deputy chief information security officers that ensure comprehensive oversight of the company’s ...
In April 2024, Microsoft uncovered a vulnerability in macOS that could allow specially crafted codes to escape the App Sandbox and run unrestricted on the system. An attacker could create an exploit ...
Leveraging Microsoft Purview to secure your organization’s data Once organizations set goals and prioritize data security opportunities, it’s time to assess their environment and implement robust ...