Select Page

Destructive malware targeting Ukrainian organizations

Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple organizations in Ukraine. This malware first appeared on victim systems in Ukraine on January 13, 2022. Microsoft is aware of the ongoing geopolitical events in ... continue reading
Magic Quadrant for Cloud Database Management Systems

Microsoft named a Leader in 2021 Gartner® Magic Quadrant™ for Cloud DBMS Platforms

We are pleased to share that Microsoft is named a Leader in the 2021 Gartner® Magic Quadrant™ for Cloud Database Management Systems.1 This placement reflects our completeness of vision and ability to execute, and we feel is a testament to ... continue reading

Best practices for AI security risk management

Today, we are releasing an AI security risk assessment framework as a step to empower organizations to reliably audit, track, and improve the security of the AI systems. In addition, we are providing new updates to Counterfit, our open-source tool ... continue reading
Diagram showing clients/services like Outlook and Exchange Online accessing tokens – including cached access tokens from the new Backup Auth service

Advancing service resilience in Azure Active Directory with its backup authentication service

“Continuing our Advancing Reliability blog series, which highlights key updates and initiatives related to improving the reliability of the Azure platform and services, today we turn our focus to Azure Active Directory (Azure AD). We laid out the core availability ... continue reading

Achieving Zero Trust readiness in your apps #1: Why it matters

Hello! I’m Jeff Sakowicz, Principal Program Management Lead for Application Platform Security within the Microsoft Identity team. Our team’s goal is to foster a secure, trustworthy, and thriving app ecosystem. Part of achieving this goal is enabling apps to support ... continue reading
ChristianKielhorn_12-1636488021862.png

How to retrieve an Azure AD Bulk Token with PowerShell

Hi, my Name is Christian Kielhorn, and I’m a Senior Customer Engineer – formerly known as Premier Field Engineer – within Germanys Customer Success Organization for Modern Work. Today I’d like to come back to a customer’s question – as ... continue reading

Discover what’s new to Microsoft database services—recap from Microsoft Ignite

Whether it’s SQL Server, Azure SQL, open source, or NoSQL, Microsoft’s database services are here to help you build cloud-native applications or modernize existing applications with fully managed, flexible databases. Last week at Microsoft Ignite, there were many announcements to ... continue reading
Video 2 of the Azure VMware Solution Zero to Hero Series!

Video 2 of the Azure VMware Solution Zero to Hero Series!

Continuing with our Azure VMware Solution (AVS) zero to hero video series, this week the next video releases! In this video, Shabaz Darr (@ShabazDarr) and I cover the high level overview for Azure VMware Solution, taking you from zero closer ... continue reading
Screenshot of csrutil showing the SIP status

Microsoft finds new macOS vulnerability, Shrootless, that could bypass System Integrity Protection

Microsoft has discovered a vulnerability that could allow an attacker to bypass System Integrity Protection (SIP) in macOS and perform arbitrary operations on a device. We also found a similar technique that could allow an attacker to elevate their privileges ... continue reading
AzureFunBytes Short - Hybrid Cloud and Azure Arc with @ThomasMaurer

AzureFunBytes Short – Hybrid Cloud and Azure Arc with @ThomasMaurer

AzureFunBytes is a weekly opportunity to learn more about the fundamentals and foundations that make up Azure. It's a chance for me to understand more about what people across the Azure organization do and how they do it. Every week ... continue reading