Microsoft Threat Intelligence uncovered a macOS vulnerability that could potentially allow an attacker to bypass the operating system’s Transparency, Consent, and Control (TCC) technology and gain unauthorized access to a user’s protected data. The vulnerability, which we refer to as “HM Surf”, involves removing the TCC protection for[…]
Read MoreEurope’s energy network is facing unprecedented pressure. By 2030, the continent’s energy demand is expected to rise by nearly 20%, while grid flexibility needs will more than double, putting enormous pressure on aging infrastructure.1 As renewable energy integration increases, Europe’s grids will require seven times more flexibility by[…]
Read MoreHi, Microsoft 365 Insiders! My name is Mark Rideout and I’m a Product Manager on the Office AI team. I am excited to share that we’re bringing the Draw and Hold gesture (already available in OneNote) to both Excel and PowerPoint for Windows, making it easier to create[…]
Read MoreMicrosoft customers face more than 600 million cybercriminal and nation-state attacks every day, ranging from ransomware to phishing to identity attacks. Once again, nation-state affiliated threat actors demonstrated that cyber operations—whether for espionage, destruction, or influence—play a persistent supporting role in broader geopolitical conflicts. Also fueling the escalation[…]
Read MoreHello, Microsoft 365 Insiders! I’m Michael Heyns and I’m Product Manager on the Word team. I’m excited to share with you a new way to leverage Copilot in Word to get coaching suggestions as you draft and iterate on your content in Word for the web. Improve[…]
Read More