29 Ottobre 2024
2024 release wave 2 launches with hundreds of Copilot capabilities

We’ve launched 2024 release wave 2 for Microsoft Dynamics 365, Microsoft Power Platform, and role-based Microsoft Copilot offerings—introducing a rollout of new features and enhanced capabilities releasing between October 2024 and March 2025. These updates include advanced Copilot capabilities for Microsoft 365 Copilot for Sales, Copilot for Service,[…]

Read More
22 Ottobre 2024
Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action

Healthcare organizations are an increasingly attractive target for threat actors. In a new Microsoft Threat Intelligence report, US healthcare at risk: strengthening resiliency against ransomware attacks, our researchers identified that ransomware continues to be among the most common and impactful cyberthreats targeting organizations. The report offers a holistic[…]

Read More
22 Ottobre 2024
Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action

Healthcare organizations are an increasingly attractive target for threat actors. In a new Microsoft Threat Intelligence report, US healthcare at risk: strengthening resiliency against ransomware attacks, our researchers identified that ransomware continues to be among the most common and impactful cyberthreats targeting organizations. The report offers a holistic[…]

Read More
17 Ottobre 2024
New macOS vulnerability, “HM Surf”, could lead to unauthorized data access

Microsoft Threat Intelligence uncovered a macOS vulnerability that could potentially allow an attacker to bypass the operating system’s Transparency, Consent, and Control (TCC) technology and gain unauthorized access to a user’s protected data. The vulnerability, which we refer to as “HM Surf”, involves removing the TCC protection for[…]

Read More
17 Ottobre 2024
New macOS vulnerability, “HM Surf”, could lead to unauthorized data access

Microsoft Threat Intelligence uncovered a macOS vulnerability that could potentially allow an attacker to bypass the operating system’s Transparency, Consent, and Control (TCC) technology and gain unauthorized access to a user’s protected data. The vulnerability, which we refer to as “HM Surf”, involves removing the TCC protection for[…]

Read More
15 Ottobre 2024
Escalating cyber threats demand stronger global defense and cooperation

Microsoft customers face more than 600 million cybercriminal and nation-state attacks every day, ranging from ransomware to phishing to identity attacks. Once again, nation-state affiliated threat actors demonstrated that cyber operations—whether for espionage, destruction, or influence—play a persistent supporting role in broader geopolitical conflicts. Also fueling the escalation[…]

Read More
11 Ottobre 2024
Microsoft’s guidance to help mitigate Kerberoasting  

As cyberthreats continue to evolve, it’s essential for security professionals to stay informed about the latest attack vectors and defense mechanisms. Kerberoasting is a well-known Active Directory (AD) attack vector whose effectiveness is growing because of the use of GPUs to accelerate password cracking techniques.  Because Kerberoasting enables cyberthreat[…]

Read More
11 Ottobre 2024
Microsoft’s guidance to help mitigate Kerberoasting  

As cyberthreats continue to evolve, it’s essential for security professionals to stay informed about the latest attack vectors and defense mechanisms. Kerberoasting is a well-known Active Directory (AD) attack vector whose effectiveness is growing because of the use of GPUs to accelerate password cracking techniques.  Because Kerberoasting enables cyberthreat[…]

Read More
10 Ottobre 2024
​​Cyber Signals Issue 8 | Education under siege: How cybercriminals target our schools​​

Introduction | Security snapshot | Threat briefingDefending against attacks | Expert profile  Education is essentially an “industry of industries,” with K-12 and higher education enterprises handling data that could include health records, financial data, and other regulated information. At the same time, their facilities can host payment processing[…]

Read More
10 Ottobre 2024
​​Cyber Signals Issue 8 | Education under siege: How cybercriminals target our schools​​

Introduction | Security snapshot | Threat briefingDefending against attacks | Expert profile  Education is essentially an “industry of industries,” with K-12 and higher education enterprises handling data that could include health records, financial data, and other regulated information. At the same time, their facilities can host payment processing[…]

Read More