#microsoft-entra-id

[ follow ]
#microsoft
Information security
fromTheregister
1 hour ago

Microsoft closes book on rogue Windows Server 2025 upgrades

Microsoft has resolved the Windows Server 2025 upgrade issue, but new problems have emerged with the cumulative update KB5082063.
Privacy technologies
fromThe Verge
2 days ago

Microsoft faces fresh Windows Recall security concerns

A new tool, TotalRecall Reloaded, extracts data from Microsoft's redesigned Recall feature, raising ongoing security and privacy concerns.
European startups
fromTheregister
1 day ago

Microsoft announces product it doesn't want anyone to buy

Microsoft will provide additional security updates for older Exchange Server and Skype for Business Server versions until October 2026 due to customer migration delays.
European startups
fromTechRepublic
1 day ago

Microsoft Takes Over Key Stargate Site in Latest OpenAI Pullback

Microsoft has taken over data center capacity in Norway originally intended for OpenAI's Stargate project amid OpenAI's spending reductions.
World news
fromTheregister
1 week ago

Microsoft hints at bit bunkers for war zones

Microsoft is redesigning datacenters in conflict-prone regions due to Iranian attacks targeting Middle Eastern facilities linked to US military operations.
DevOps
fromInfoWorld
4 hours ago

When cloud giants neglect resilience

Cloud outages highlight reliability issues as providers prioritize cost-cutting over service stability, raising questions about acceptable levels of unreliability.
Remote teams
fromComputerworld
6 hours ago

AI is finally delivering productivity - for remote employees

The key to productivity with AI lies in the freedom to use it effectively, not just the technology itself.
EU data protection
fromWIRED
19 hours ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Software development
fromTechzine Global
23 hours ago

Scale sets edge platform's software ever more free from hardware constraints

Scale Computing is reducing hardware requirements for its software, allowing more flexibility for partners and customers in choosing hardware platforms.
#cybersecurity
Information security
fromThe Hacker News
3 weeks ago

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

An active device code phishing campaign targets Microsoft 365 identities across over 340 organizations in multiple countries, utilizing various deceptive techniques.
Careers
fromSecurityWeek
2 days ago

CISO Conversations: Ross McKerchar, CISO at Sophos

Ross McKerchar transitioned from IT to cybersecurity, becoming CISO at Sophos, emphasizing leadership skills and the growing cybersecurity profession.
Information security
fromThe Hacker News
3 weeks ago

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

An active device code phishing campaign targets Microsoft 365 identities across over 340 organizations in multiple countries, utilizing various deceptive techniques.
#ai
Web development
fromInfoWorld
2 days ago

Tap into the AI APIs of Google Chrome and Microsoft Edge

Chrome and Edge browsers provide built-in APIs for local AI tasks like translation and summarization using locally hosted models.
Information security
fromComputerWeekly.com
1 day ago

UK businesses must face up to AI threat, says government | Computer Weekly

AI models are rapidly advancing in discovering and exploiting software vulnerabilities, necessitating urgent attention from business leaders.
Web development
fromInfoWorld
2 days ago

Tap into the AI APIs of Google Chrome and Microsoft Edge

Chrome and Edge browsers provide built-in APIs for local AI tasks like translation and summarization using locally hosted models.
Information security
fromComputerWeekly.com
1 day ago

UK businesses must face up to AI threat, says government | Computer Weekly

AI models are rapidly advancing in discovering and exploiting software vulnerabilities, necessitating urgent attention from business leaders.
Information security
fromTechzine Global
3 days ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
#ai-governance
fromNature
3 days ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
Privacy professionals
from404 Media
3 days ago

Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit

Microsoft, Meta, and Google may be violating California privacy laws by failing to honor user opt-out requests for ad cookies.
Information security
fromThe Hacker News
2 minutes ago

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Threat actors are exploiting three vulnerabilities in Microsoft Defender for elevated privileges, with one flaw already addressed by Microsoft.
fromComputerworld
1 day ago

Microsoft Teams cheat sheet: How to get started

Using the Mic button and dropdown, you can select your audio devices, including your speaker volume. In most cases, Teams selects this correctly, but if you want to switch to a Bluetooth or USB headset, for instance, choose the right device from the Speaker and Microphone section of the right pane.
Remote teams
DevOps
fromInfoQ
14 hours ago

AWS Launches Agent Registry in Preview to Govern AI Agent Sprawl Across Enterprises

AWS Agent Registry provides a centralized catalog for managing AI agents, tools, and skills across organizations, addressing agent sprawl and compliance issues.
Tech industry
fromTheregister
6 days ago

Mozilla calls out Microsoft over Copilot push in Windows

Mozilla criticizes Microsoft's Copilot integration for lacking user consent and prioritizing business interests over customer choice.
Information security
fromComputerWeekly.com
1 day ago

Cyber Essentials closes the MFA loophole but leaves some organisations adrift | Computer Weekly

Multi-factor authentication becomes mandatory under Cyber Essentials v3.3, with no exceptions for organizations failing to implement it.
#iam
Information security
fromInfoWorld
2 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
2 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromInfoWorld
2 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
2 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
DevOps
from24/7 Wall St.
22 hours ago

Oracle's New AWS Partnership Just Put It Ahead of Azure and Google Cloud

Multicloud setups are essential for enterprise AI, enabling seamless data movement and integration across different cloud providers.
DevOps
fromAzure DevOps Blog
1 day ago

One-click security scanning and org-wide alert triage come to Advanced Security - Azure DevOps Blog

New capabilities in Azure DevOps simplify application security with one-click CodeQL setup and a unified alerts experience for security teams.
DevOps
fromAzure DevOps Blog
2 days ago

April Patches for Azure DevOps Server - Azure DevOps Blog

Customers should update to the latest version of Azure DevOps Server for security and reliability.
Information security
fromTheregister
2 days ago

Ancient Excel bug comes out of retirement for active attacks

A 17-year-old critical Excel vulnerability is actively being exploited, prompting CISA to issue a patch deadline for federal agencies.
Privacy technologies
fromAzure DevOps Blog
4 weeks ago

Authentication Tokens Are Not a Data Contract - Azure DevOps Blog

Authentication tokens should only validate authorization, not serve as data interfaces; upcoming encryption will make token payloads unreadable, breaking applications that decode token claims.
Business intelligence
fromTechzine Global
4 weeks ago

Microsoft expands Fabric with Database Hub and SQL migration assistant

Microsoft's Database Hub provides centralized management for multiple database services including Azure SQL, Cosmos DB, PostgreSQL, and MySQL, with migration assistance and intelligent agent recommendations.
Privacy professionals
fromArs Technica
4 weeks ago

Federal cyber experts called Microsoft's cloud a "pile of shit," approved it anyway

Microsoft's Government Community Cloud High received federal cybersecurity approval despite documented security concerns and inadequate documentation, following years of failed security assessments.
#hybrid-work
Remote teams
fromBusiness Matters
4 weeks ago

Hybrid work continues to drive demand for virtual desktop infrastructure

52% of employees with remote-capable jobs work in hybrid arrangements, prompting organizations to rethink cybersecurity strategies.
fromwww.bleepingcomputer.com
2 months ago
Information security

Why Active Directory password resets are surging in hybrid work

Hybrid work turned routine password resets into widespread productivity and security problems by increasing lockouts, remote troubleshooting complexity, and helpdesk workload.
Remote teams
fromBusiness Matters
4 weeks ago

Hybrid work continues to drive demand for virtual desktop infrastructure

52% of employees with remote-capable jobs work in hybrid arrangements, prompting organizations to rethink cybersecurity strategies.
#microsoft-365-copilot
DevOps
fromInfoWorld
2 weeks ago

Azure's new AI modernization tools

Microsoft's Azure Copilot aids in application migration and modernization, addressing technical debt and improving cloud infrastructure management.
fromTechzine Global
4 days ago

Commvault launches AI tools for secure agentic AI era

"In agentic environments, agents mutate state across data, systems, and configurations in ways that compound fast and are hard to trace," says Pranay Ahlawat, Chief Technology and AI Officer at Commvault.
Information security
Privacy technologies
fromTheregister
1 month ago

Microsoft tightens Authenticator checks on Android and iOS

Microsoft automatically removes Entra credentials from jailbroken and rooted iOS and Android devices, with enforcement beginning on Android now and iOS in April 2026, completing by July 2026.
fromTechzine Global
1 month ago

DataBahn and Microsoft accelerate SIEM deployment through integration

DataBahn's AI-driven connectors automatically normalize, enrich, and route telemetry from more than 500 sources to Microsoft Sentinel. DataBahn's Cruz AI engine determines which data to send to the analytics tier and which to the Sentinel data lake for long-term storage. Customers report cost savings of up to 60 percent on Sentinel ingestion thanks to this intelligent tiering mechanism.
Business intelligence
Privacy technologies
fromTechzine Global
1 month ago

Windows Hello gets passkey support for Entra accounts

Microsoft is introducing passkey support with Windows Hello for Microsoft Entra sign-in, enabling passwordless authentication resistant to phishing attacks on Windows devices.
#identity-management
fromThe Hacker News
1 week ago
Information security

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
1 week ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
1 week ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
European startups
fromTechzine Global
1 month ago

Microsoft 365 E7 unveiled: biggest licensing change in ten years

Microsoft launches Microsoft 365 E7 Frontier Worker Suite on May 1, combining Microsoft 365 E5, Microsoft 365 Copilot, and Agent 365 for $99 per user per month, representing the largest release since E5 in 2015.
fromMedium
1 month ago

Mastering Azure Governance: Why It Matters and How to Get Started

Azure Governance is the set of policies, processes, and technical controls that ensure your Azure environment is secure, compliant, and well-managed. It provides a structured approach to organizing subscriptions, resources, and management groups, while defining standards for naming, tagging, security, and operational practices.
DevOps
Artificial intelligence
fromComputerWeekly.com
1 month ago

Microsoft Cowork: One data store for all your M365 assets | Computer Weekly

Microsoft launches Cowork, an AI tool combining Anthropic's agentic model with Microsoft 365 in a new E7 subscription tier priced at $99 per user, featuring Work IQ context engine for enterprise data access.
Tech industry
fromTechRepublic
2 months ago

Microsoft Overhauls Security Leadership as AI Expands Enterprise Attack Surface

Microsoft reorganized security leadership, placing security and engineering quality directly under CEO oversight to strengthen core system protection amid accelerating AI adoption.
Information security
fromTechRepublic
3 weeks ago

Microsoft 365 Under Siege: Phishing Campaign Bypasses MFA Across 5 Countries

A sophisticated phishing campaign exploiting Microsoft 365 accounts has affected over 340 organizations across five countries using a legitimate OAuth feature.
Tech industry
fromTheregister
2 months ago

Microsoft's shift to cloud management sw brings concerns

Microsoft will deprecate SCOM management packs for SQL Server Reporting Services, Power BI Report Server and Analysis Services; support and updates end January 2027.
Artificial intelligence
fromTechzine Global
1 month ago

Microsoft is mulling an E7 tier for AI agents

Microsoft is developing E7, a new $99/month subscription bundling Copilot and AI agent management, treating AI agents as digital employees with identities, email accounts, and Teams access.
Information security
fromTechzine Global
3 weeks ago

Microsoft Secures AI Agents with Defender, Entra, and Purview

Microsoft introduces new features to secure AI agents, emphasizing the need for a dedicated security layer for their management and protection.
Artificial intelligence
fromTheregister
1 month ago

Microsoft reportedly eyes E7 tier for AI agents

Microsoft plans to introduce an E7 subscription tier bundling Copilot and Agent 365 tools, priced at approximately $99 monthly, to license AI agents as digital employees requiring identities, email accounts, and policy controls.
fromTheregister
2 months ago

Microsoft sets Copilot agents loose on your OneDrive files

Microsoft has made OneDrive agents generally available, allowing users to query multiple documents simultaneously through Copilot instead of just one at a time. Users can select up to 20 files and create an agent, saved as a .agent file in OneDrive. Rather than teasing information out of individual documents, Microsoft says users can make cross-document queries, including "What decisions have we made so far?" and "What risks keep coming up?" The agent then generates a response based on the documents' content.
Tech industry
Business intelligence
fromBusiness Insider
1 month ago

Microsoft is considering a new AI-loaded software bundle for Microsoft 365, sources say

Microsoft is considering launching E7, a premium AI-enhanced enterprise productivity bundle priced up to $99 per user monthly, featuring Copilot and Agent 365.
#microsoft-intune-security
Information security
fromTechzine Global
4 weeks ago

Major warning: Secure your Microsoft environment

CISA warns organizations to strengthen Microsoft Intune security after attackers exploited the platform in a Stryker cyberattack, gaining administrative access and disrupting healthcare operations.
Information security
fromTheregister
4 weeks ago

Microsoft Intune: Lock it down, warn feds after Stryker

Iran-linked Handala attacked Stryker using compromised Microsoft Intune to wipe devices; CISA urges companies to implement least privilege access controls and follow Microsoft security best practices.
Information security
fromTechzine Global
4 weeks ago

Major warning: Secure your Microsoft environment

CISA warns organizations to strengthen Microsoft Intune security after attackers exploited the platform in a Stryker cyberattack, gaining administrative access and disrupting healthcare operations.
Information security
fromTheregister
4 weeks ago

Microsoft Intune: Lock it down, warn feds after Stryker

Iran-linked Handala attacked Stryker using compromised Microsoft Intune to wipe devices; CISA urges companies to implement least privilege access controls and follow Microsoft security best practices.
#microsoft-teams
Tech industry
fromTheregister
2 months ago

Microsoft ends some standalone SharePoint and OneDrive plans

Microsoft is retiring standalone SharePoint Online and OneDrive for Business Plan 1 and Plan 2 SKUs, urging customers toward Microsoft 365 suites.
fromTheregister
4 weeks ago

MS update kills Microsoft account sign-ins in Windows 11

This issue occurs when the device enters a specific network connectivity state, and may resolve on its own. A restart should also fix it, provided the device is online at the time.
Information security
Tech industry
fromInfoWorld
2 months ago

Azure outage disrupts VMs and identity services for over 10 hours

A policy change blocking public read access on Microsoft-managed storage caused an over-10-hour Azure outage affecting VM deployments, managed identities, and developer pipelines.
DevOps
fromSecurityWeek
1 month ago

AWS Expands Security Hub Into a Cross-Domain Security Platform

AWS Security Hub Extended integrates AWS security tools and curated third-party solutions into a unified mini-SOC platform for simplified enterprise security management across multiple domains.
Information security
fromComputerWeekly.com
1 month ago

Beyond integration theatre: Building stronger cyber platforms | Computer Weekly

Integration layers between security platforms, not the platforms themselves, have become the primary enterprise security risk requiring rigorous governance of delegated trust.
fromAzure DevOps Blog
1 month ago

Temporary rollback: build identities can access Advanced Security: read alerts again - Azure DevOps Blog

We restricted API access for build identities as a security improvement but failed to provide an early notice for customers that relied upon this for various automations. We're rolling it back temporarily. The restriction will be re-enforced on April 15, 2026.
Information security
Information security
fromTechRepublic
1 month ago

Hackers Pose as IT Staff in Microsoft Teams to Install Malware

Attackers impersonate Microsoft Teams and IT personnel to deliver A0Backdoor malware through malicious MSI installers, using social engineering and DLL sideloading techniques to establish persistent network access.
Information security
fromSecurityWeek
2 months ago

Microsoft Moves Closer to Disabling NTLM

NTLM authentication will be disabled by default in upcoming Windows Server and client releases, requiring explicit re-enablement and migration to Kerberos.
Information security
fromComputerworld
2 months ago

Microsoft to roll out a 'consent first' model to protect Windows

Microsoft will default Windows to a consent-first model, allowing only explicitly approved, properly signed apps while giving users visibility and control over permissions.
Information security
fromSecuritymagazine
1 month ago

From the Outside In: A Smarter Approach to Vendor Access

Organizations should shift from employee-centric access control to perimeter-focused security strategies to better manage risks from external vendors, contractors, and temporary workers.
fromThe Hacker News
2 months ago

Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

Of the 59 flaws, five are rated Critical, 52 are rated Important, and two are rated Moderate in severity. Twenty-five of the patched vulnerabilities have been classified as privilege escalation, followed by remote code execution (12), spoofing (7), information disclosure (6), security feature bypass (5), denial-of-service (3), and cross-site scripting (1). It's worth noting that the patches are in addition to three security flaws that Microsoft has addressed in its Edge browser since the release of the January 2026 Patch Tuesday update,
Information security
Information security
fromComputerworld
1 month ago

New phishing campaign tricks employees into bypassing Microsoft 365 MFA

Attackers trick employees into registering a hacker-controlled device via OAuth device authorization, granting persistent access to Microsoft accounts and bypassing MFA.
[ Load more ]