17 Ottobre 2024
New macOS vulnerability, “HM Surf”, could lead to unauthorized data access

Microsoft Threat Intelligence uncovered a macOS vulnerability that could potentially allow an attacker to bypass the operating system’s Transparency, Consent, and Control (TCC) technology and gain unauthorized access to a user’s protected data. The vulnerability, which we refer to as “HM Surf”, involves removing the TCC protection for[…]

Read More
17 Ottobre 2024
New macOS vulnerability, “HM Surf”, could lead to unauthorized data access

Microsoft Threat Intelligence uncovered a macOS vulnerability that could potentially allow an attacker to bypass the operating system’s Transparency, Consent, and Control (TCC) technology and gain unauthorized access to a user’s protected data. The vulnerability, which we refer to as “HM Surf”, involves removing the TCC protection for[…]

Read More
17 Ottobre 2024
Enlit Europe 2024: Rewiring the energy industry’s operational core with cloud and AI

Europe’s energy network is facing unprecedented pressure. By 2030, the continent’s energy demand is expected to rise by nearly 20%, while grid flexibility needs will more than double, putting enormous pressure on aging infrastructure.1 As renewable energy integration increases, Europe’s grids will require seven times more flexibility by[…]

Read More
16 Ottobre 2024
Create neat lines and shapes with ink in Excel and PowerPoint for Windows

Hi, Microsoft 365 Insiders! My name is Mark Rideout and I’m a Product Manager on the Office AI team. I am excited to share that we’re bringing the Draw and Hold gesture (already available in OneNote) to both Excel and PowerPoint for Windows, making it easier to create[…]

Read More
15 Ottobre 2024
Escalating cyber threats demand stronger global defense and cooperation

Microsoft customers face more than 600 million cybercriminal and nation-state attacks every day, ranging from ransomware to phishing to identity attacks. Once again, nation-state affiliated threat actors demonstrated that cyber operations—whether for espionage, destruction, or influence—play a persistent supporting role in broader geopolitical conflicts. Also fueling the escalation[…]

Read More