In July, we’ve delivered multiple improvements across Azure DevOps services. You can now dismiss dependency scanning alerts in Advanced Security that you believe to be a false positive or acceptable risk. In Azure Repos, we changed the default behavior to remove “Edit policies” permission when creating a new branch. […]
Read MoreSpeech-to-text REST API v3.0 will be retired by 31 March 2026. Update your code that uses Speech-to-text REST API. We recently updated the Speech-to-text REST API to version 3.1. Version 3.1 builds on the capabilities of the previous version and adds new features including language identification and multi-speaker diarization. With[…]
Read MoreIn cloud environments, cryptojacking – a type of cyberattack that uses computing power to mine cryptocurrency – takes the form of cloud compute resource abuse, which involves a threat actor compromising legitimate tenants. Cloud compute resource abuse could result in financial loss to targeted organizations due to the[…]
Read MoreNo entrepreneur goes into business to learn how to fight off cyberattacks. They go into business to create the best bakery in town, to build beautiful new homes, or to sell things they love. Almost no business, however, can operate in the modern world without a digital footprint, which[…]
Read MoreThe security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest post of our Community Voices blog series, Microsoft Security Senior Product Marketing Manager Brooke Lynn Weenig talks with Truesec Chief Chaos Officer Jayson Street, who wrote “Dissecting the Hack: the f0rb1dd3n Network” series and featured on[…]
Read More