Microsoft

MicrosoftSecurity

Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability

Credit to Author: Microsoft Threat Intelligence| Date: Mon, 28 Jul 2025 16:00:00 +0000

Microsoft Threat Intelligence has discovered a macOS vulnerability, tracked as CVE-2025-31199, that could allow attackers to steal private data of files normally protected by Transparency, Consent, and Control (TCC), including the ability to extract and leak sensitive information cached by Apple Intelligence.

The post Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Disrupting active exploitation of on-premises SharePoint vulnerabilities

Credit to Author: Microsoft Threat Intelligence| Date: Tue, 22 Jul 2025 13:00:00 +0000

Microsoft has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon, exploiting vulnerabilities targeting internet-facing SharePoint servers. In addition, we have observed another China-based threat actor, tracked as Storm-2603, exploiting these vulnerabilities. Microsoft has released new comprehensive security updates for all supported versions of SharePoint Server (Subscription Edition, 2019, and 2016) that protect customers against these new vulnerabilities. Customers should apply these updates immediately to ensure they are protected.

The post Disrupting active exploitation of on-premises SharePoint vulnerabilities appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Microsoft Sentinel data lake: Unify signals, cut costs, and power agentic AI

Credit to Author: Scott Woodgate and Krishna Kumar Parthasarathy| Date: Tue, 22 Jul 2025 13:00:00 +0000

We’re evolving our industry-leading Security Incidents and Event Management solution (SIEM), Microsoft Sentinel, to include a modern, cost-effective data lake. By unifying all your security data, Microsoft Sentinel data lake, in public preview, accelerates AI adoption and drives unparalleled visibility, empowering teams to detect and respond faster. With Sentinel data lake, you’re no longer forced to choose between retaining critical data and staying within budget. ​ 

The post Microsoft Sentinel data lake: Unify signals, cut costs, and power agentic AI appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Microsoft at Black Hat USA 2025: A unified approach to modern cyber defense

Credit to Author: Elliot Volkman| Date: Fri, 18 Jul 2025 16:00:00 +0000

Microsoft will spotlight its AI-first, end-to-end security platform at Black Hat USA 2025. Read our blog post for details on how to connect with us there and what to expect from our participation.

The post Microsoft at Black Hat USA 2025: A unified approach to modern cyber defense appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Transparency on Microsoft Defender for Office 365 email security effectiveness

Credit to Author: Ramya Chitrakar and Scott Woodgate| Date: Thu, 17 Jul 2025 16:00:00 +0000

Microsoft believes in transparently sharing performance data from Microsoft Defender for Office 365, and other ecosystem providers, to help customers evaluate email security solutions and make decisions to layer for defense in depth.

The post Transparency on Microsoft Defender for Office 365 email security effectiveness appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms

Credit to Author: Rob Lefferts| Date: Wed, 16 Jul 2025 17:00:00 +0000

We are honored to be recognized once again as a Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms—our sixth consecutive time. Microsoft was recognized for its completeness of vision and ability to execute, which we believe underscores the effectiveness of Defender for Endpoint in the face of an ever-shifting threat environment.​

The post Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Protecting customers from Octo Tempest attacks across multiple industries

Credit to Author: Microsoft Defender Security Research Team| Date: Wed, 16 Jul 2025 16:00:00 +0000

To help protect and inform customers, Microsoft highlights protection coverage across the Microsoft Defender security ecosystem to protect against threat actors like Octo Tempest.

The post Protecting customers from Octo Tempest attacks across multiple industries appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Improving IT efficiency with Microsoft Security Copilot in Microsoft Intune and Microsoft Entra

Credit to Author: Dorothy Li| Date: Mon, 14 Jul 2025 16:00:00 +0000

Announcing the general availability of Microsoft Security Copilot capabilities for IT with Microsoft Intune and Microsoft Entra, offering AI-powered efficiency and enhanced security for your operations.

The post Improving IT efficiency with Microsoft Security Copilot in Microsoft Intune and Microsoft Entra appeared first on Microsoft Security Blog.

Read More