23 Ottobre 2024
Seamlessly switch between your Apple devices with Handoff support for Word, Excel, and PowerPoint

Hello, Microsoft 365 Insiders! My name is Samer Sawaya and I’m a Product Manager working on Apple Platforms Experiences team. I’m thrilled to announce the availability of Handoff support for Microsoft Word, Excel, and PowerPoint on your Apple devices across Mac, iPhone, and iPad.    Seamlessly switch between your[…]

Read More
22 Ottobre 2024
Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action

Healthcare organizations are an increasingly attractive target for threat actors. In a new Microsoft Threat Intelligence report, US healthcare at risk: strengthening resiliency against ransomware attacks, our researchers identified that ransomware continues to be among the most common and impactful cyberthreats targeting organizations. The report offers a holistic[…]

Read More
22 Ottobre 2024
Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action

Healthcare organizations are an increasingly attractive target for threat actors. In a new Microsoft Threat Intelligence report, US healthcare at risk: strengthening resiliency against ransomware attacks, our researchers identified that ransomware continues to be among the most common and impactful cyberthreats targeting organizations. The report offers a holistic[…]

Read More
21 Ottobre 2024
Increase productivity with Copilot in OneNote for iPad and Mac for commercial customers

Hi, Microsoft 365 Insiders! My name is Greg MacEachern, and I’m a Product Manager on the OneNote team. I’m excited to share that Copilot functionality has come to OneNote for iPad and Mac, exclusively for our commercial customers. Commercial customers can now leverage Copilot in OneNote to boost[…]

Read More
17 Ottobre 2024
New macOS vulnerability, “HM Surf”, could lead to unauthorized data access

Microsoft Threat Intelligence uncovered a macOS vulnerability that could potentially allow an attacker to bypass the operating system’s Transparency, Consent, and Control (TCC) technology and gain unauthorized access to a user’s protected data. The vulnerability, which we refer to as “HM Surf”, involves removing the TCC protection for[…]

Read More