<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"><channel><title>Microsoft Security News</title><link>https://security.libredevops.org</link><description>Aggregated Microsoft security news and advisories</description><item><title>Exposing Fox Tempest: A malware-signing service operation</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/19/exposing-fox-tempest-a-malware-signing-service-operation/</link><description>Fox Tempest is a financially motivated threat actor operating a malware‑signing‑as‑a‑service (MSaaS) used by other cybercriminals, including Vanilla Tempest and Storm groups, to more effectively distribute malicious code, including ransomware. The post Exposing Fox Tempest: A malware-signing...</description><category>Threat Intelligence</category></item><item><title>How Storm-2949 turned a compromised identity into a cloud-wide breach</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/18/storm-2949-turned-compromised-identity-into-cloud-wide-breach/</link><description>Storm-2949 turned stolen credentials into a cloud-wide breach, moving from identity compromise to large-scale data theft without using malware. This incident shows how threat actors can exploit trusted systems to operate undetected. The post How Storm-2949 turned a compromised identity into a...</description><category>Threat Intelligence</category></item><item><title>Agent 365 connector: Monitor, hunt, and investigate AI agent activity in Microsoft Sentinel</title><link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/agent-365-connector-monitor-hunt-and-investigate-ai-agent/ba-p/4520836</link><description>As enterprises scale the use of AI agents, SOC teams need visibility into AI agent behavior. The Agent 365 connector, now in public preview, streams rich agent telemetry from Agent 365 into Microsoft Sentinel data lake. Agent activity, such as agent data exposure or access drift, is surfaced...</description><category>Microsoft Sentinel</category><category>AI Security</category></item><item><title>How to better protect your growing business in an AI-powered world</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/18/how-to-better-protect-your-growing-business-in-an-ai-powered-world/</link><description>See how built-in security helps keep your growing business running, protect customer trust, and support growth. The post How to better protect your growing business in an AI-powered world appeared first on Microsoft Security Blog.</description><category>General Security</category></item><item><title>Introducing selective response actions for high-value assets in Microsoft Defender</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/introducing-selective-response-actions-for-high-value-assets-in/ba-p/4512175</link><description>Deploying Microsoft Defender on high-value assets (HVAs) such as domain controllers, ADFS servers, and other Tier-0 systems, requires a thoughtful approach to balance strong protection with operational stability. Given the powerful response capabilities available, organizations often seek greater...</description><category>Microsoft Defender for Endpoint</category></item><item><title>Build a Local Microsoft Sentinel Triage Agent in VS Code (Copilot + MCP)</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/build-a-local-microsoft-sentinel-triage-agent-in-vs-code-copilot/ba-p/4520486</link><description>Modern SOC work is not limited by data—it’s limited by the friction of collecting it. This post shows a local-first workflow that lets you investigate Microsoft Sentinel incidents from inside VS Code using GitHub Copilot Chat for reasoning and a small, deterministic MCP toolset for evidence...</description><category>Microsoft Sentinel</category><category>Threat Intelligence</category></item><item><title>How Microsoft Defender used predictive shielding to proactively disrupt a ransomware attack</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/how-microsoft-defender-used-predictive-shielding-to-proactively/ba-p/4519498</link><description>Modern ransomware attacks are increasingly designed to blend in with normal IT operations, using trusted administrative tools to quietly weaken defenses and distribute malicious payloads at scale. In a recent real‑world incident, a human‑operated ransomware actor attempted to do exactly that by...</description><category>Microsoft Defender for Endpoint</category><category>Threat Intelligence</category></item><item><title>Defense in depth for autonomous AI agents</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/14/defense-in-depth-autonomous-ai-agents/</link><description>As AI agents gain autonomy, defense in depth must evolve, with application-layer design, identity, and human oversight at the center. The post Defense in depth for autonomous AI agents appeared first on Microsoft Security Blog.</description><category>General Security</category></item><item><title>Kazuar: Anatomy of a nation-state botnet</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/14/kazuar-anatomy-of-a-nation-state-botnet/</link><description>Kazuar, a sophisticated malware family attributed to the Russian state actor Secret Blizzard, has been under constant development for years and continues to evolve in support of espionage-focused operations. Over time, Kazuar has expanded from a relatively traditional backdoor into a highly modular...</description><category>Threat Intelligence</category></item><item><title>When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/14/configuration-becomes-vulnerability-exploitable-misconfigurations-ai-apps/</link><description>Exposed UIs, weak authentication, and risky defaults could turn cloud-native AI apps on Kubernetes into potential targets by threat actors. Learn how exploitable misconfigurations lead to RCE and data leaks. The post When configuration becomes a vulnerability: Exploitable misconfigurations in AI...</description><category>General Security</category></item><item><title>TLS Certificate Pinning and Best Practices in Azure Open-Source Relational Databases</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/tls-certificate-pinning-and-best-practices-in-azure-open-source/ba-p/4519531</link><description>TLS certificate pinning in Azure Database for PostgreSQL and MySQL Transport Layer Security (TLS) encrypts data in transit between client applications and the server and authenticates the service endpoint in client-server authentication. Azure Database server certificates are issued by well-known...</description><category>General Security</category></item><item><title>Check This Out! (CTO!) Guide (April 2026)</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/check-this-out-cto-guide-april-2026/ba-p/4519149</link><description>Member: TysonPaul | Microsoft Community Hub Announcing Public Preview for Essential Machine Management Team Blog: Azure Governance and Management Author: Meagan McCrory Published: 04/06/2026 Summary: Microsoft has announced the public preview of Essential Machine Management within Azure’s Compute...</description><category>Threat Intelligence</category></item><item><title>Accelerating detection engineering using AI-assisted synthetic attack logs generation</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/12/accelerating-detection-engineering-using-ai-assisted-synthetic-attack-logs-generation/</link><description>What if you could generate realistic attack telemetry on demand? Explore research methods that translate attacker behaviors (TTPs) into synthetic logs that can trigger detections at scale and without sensitive data. The post Accelerating detection engineering using AI-assisted synthetic attack logs...</description><category>General Security</category></item><item><title>Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/12/defense-at-ai-speed-microsofts-new-multi-model-agentic-security-system-tops-leading-industry-benchmark/</link><description>Today Microsoft is announcing a major step forward in AI-powered cyber defense: a new multi-model agentic scanning harness (codenamed MDASH). The post Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark appeared first on Microsoft Security Blog.</description><category>General Security</category></item><item><title>Defending consumer web properties against modern DDoS attacks</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/12/defending-consumer-web-properties-against-modern-ddos-attacks/</link><description>Read how to protect consumer websites and defend against modern DDoS attacks with layered security, resilient architecture, and graceful service degradation. The post Defending consumer web properties against modern DDoS attacks appeared first on Microsoft Security Blog.</description><category>General Security</category></item><item><title>Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/12/undermining-the-trust-boundary-investigating-a-stealthy-intrusion-through-third-party-compromise/</link><description>Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend seamlessly into routine operations and remain undetected demonstrating that intrusions have increasingly avoided using noisy exploits, obvious malware, or custom tooling,...</description><category>Threat Intelligence</category></item><item><title>Triggering Azure Functions from Blob Storage Using Event Grid</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/triggering-azure-functions-from-blob-storage-using-event-grid/ba-p/4518184</link><description>Overview Modern workloads increasingly rely on reacting to files as soon as they arrive in Azure Blob Storage. While Azure provides multiple ways to trigger computing from blob operations, choosing the right event-driven pattern is not always straightforward—especially in enterprise environments...</description><category>General Security</category></item><item><title>What’s new in Microsoft Sentinel: RSAC 2026</title><link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-in-microsoft-sentinel-rsac-2026/ba-p/4503971</link><description>Security is entering a new era, one defined by explosive data growth, increasingly sophisticated threats, and the rise of AI-enabled operations. To keep pace, security teams need an AI-powered approach to collect, reason over, and act on security data at scale. At RSA Conference 2026 (RSAC), we’re...</description><category>Microsoft Sentinel</category><category>Microsoft Purview</category><category>Threat Intelligence</category></item><item><title>Active attack: Dirty Frag Linux vulnerability expands post-compromise risk</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/08/active-attack-dirty-frag-linux-vulnerability-expands-post-compromise-risk/</link><description>Dirty Frag is a newly disclosed Linux local privilege escalation vulnerability affecting kernel networking and memory-fragment handling components including esp4, esp6, and rxrpc. The vulnerability enables reliable escalation from an unprivileged user to root and may be leveraged after initial...</description><category>General Security</category></item><item><title>Better together with Azure WAF + Microsoft Defender for Storage + Defender for Azure SQL Databases</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/better-together-with-azure-waf-microsoft-defender-for-storage/ba-p/4517101</link><description>Authored by: Fernanda_Vela​ , saikishor​, Yura_Lee​ Reviewed by: YuriDiogenes​, Mohit_Kumar​, Amir_Dahan​, eitanbremler​ , Kitt_Weatherman​ Introduction Often, customers ask why additional workload protection is needed when a web application firewall is already in place. Azure Web Application...</description><category>Microsoft Defender for Cloud</category><category>Threat Intelligence</category></item><item><title>Extending Sentinel Data Integration: Azure Blob Storage Support for CCF Connectors</title><link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/extending-sentinel-data-integration-azure-blob-storage-support/ba-p/4516896</link><description>As organizations scale their security operations, the ability to ingest, process, and analyze high volumes of data reliably becomes increasingly critical. Microsoft Sentinel continues to expand its ecosystem through the Codeless Connector Framework (CCF), enabling ISVs to build and deliver...</description><category>Microsoft Sentinel</category></item><item><title>How Frontier Firms are rebuilding the operating model for the age of AI</title><link>https://blogs.microsoft.com/blog/2026/05/05/how-frontier-firms-are-rebuilding-the-operating-model-for-the-age-of-ai/</link><description>Updated May 11, 2026: The post was updated to reflect that third-party plugins will be available starting May 12, 2026. Spend time with any software engineering team right now and you’ll see something worth paying attention to. Over the last few years, the way software gets built has moved through...</description><category>General Security</category></item><item><title>What’s new in Microsoft Sentinel: April 2026</title><link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-in-microsoft-sentinel-april-2026/ba-p/4516354</link><description>Welcome to the April 2026 edition of What's new in Microsoft Sentinel. April brings a broad set of updates, with RSAC 2026 announcements rolling out alongside new features. Highlights include cost limit enforcement to prevent runaway query costs, curated open-source intelligence in Threat...</description><category>Microsoft Sentinel</category><category>Threat Intelligence</category><category>Microsoft Purview</category></item><item><title>Microsoft Defender for Cloud Customer Newsletter</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/microsoft-defender-for-cloud-customer-newsletter/ba-p/4516842</link><description>What's new in Defender for Cloud? Container runtime anti-malware detection and blocking and DNS Detection for Kubernetes is now GA in Defender for Containers for AKS, EKS, and GKE. Learn more about these announcements here and here. Defender for Storage integration in Azure Portal Storage Center...</description><category>Microsoft Defender for Cloud</category><category>Threat Intelligence</category></item><item><title>Monthly news - May 2026</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/monthly-news-may-2026/ba-p/4516764</link><description>Microsoft DefenderMonthly news - May 2026 Edition This is our monthly "What's new" blog post, summarizing product updates and various new assets we released over the past month across our Defender products. In this edition, we are looking at all the goodness from April 2026. We are now including...</description><category>Microsoft Defender XDR</category><category>Microsoft Defender for Endpoint</category><category>Microsoft Defender for Identity</category><category>Microsoft Sentinel</category><category>Microsoft Purview</category><category>Microsoft Defender for Cloud</category><category>Microsoft Defender for Office 365</category></item><item><title>Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/04/breaking-the-code-multi-stage-code-of-conduct-phishing-campaign-leads-to-aitm-token-compromise/</link><description>Microsoft Defender Research observed a large-scale credential theft campaign that exemplifies this trend, using code of conduct-themed lures, a multi-step attack chain, and legitimate email services to distribute fully authenticated messages from attacker-controlled domains. The post Breaking the...</description><category>Threat Intelligence</category></item><item><title>Purpose For Your PKI (Practical PKI Part 3)</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/purpose-for-your-pki-practical-pki-part-3/ba-p/4512518</link><description>My name is Ron Arestia, and I am a Security Researcher with Microsoft’s Detection and Response Team (DART). We respond to customer cybersecurity incidents to assist with containment and recovery from threat actors. In this brief blog post, we will discuss the “why” behind your PKI. This is part 3...</description><category>Threat Intelligence</category></item><item><title>Email threat landscape: Q1 2026 trends and insights</title><link>https://www.microsoft.com/en-us/security/blog/2026/04/30/email-threat-landscape-q1-2026-trends-and-insights/</link><description>In early 2026, email threats increased with a rise in credential phishing, QR code phishing, and CAPTCHA-gated campaigns, highlighted by Microsoft’s disruption of the Tycoon2FA phishing platform which led to a 15% volume decrease and shifts in threat actor tactics. The post Email threat landscape:...</description><category>Threat Intelligence</category></item><item><title>Public Preview: Managed Identity support for graphical session recording</title><link>https://techcommunity.microsoft.com/t5/azure-network-security-blog/public-preview-managed-identity-support-for-graphical-session/ba-p/4513139</link><description>Overview Azure Bastion provides secure RDP and SSH access to Azure virtual machines directly via the Azure portal or via the native SSH/RDP client already installed on your local computer. Today, we are introducing public preview for managed identity support for session recording, giving...</description><category>General Security</category></item><item><title>Hardening OpenClaw on AKS: Mitigating Container Escapes with Kata microVM Isolation</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/hardening-openclaw-on-aks-mitigating-container-escapes-with-kata/ba-p/4516030</link><description>What is OpenClaw, and what security challenges does it pose with container escapes? OpenClaw is an open-source autonomous AI agent designed for power users and developers to automate tasks, such as managing emails, files, and scheduling via chat apps like WhatsApp or Telegram. While OpenClaw...</description><category>AI Security</category></item><item><title>Use Data Wrangler to Streamline Your Microsoft Sentinel data lake Notebook Development</title><link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/use-data-wrangler-to-streamline-your-microsoft-sentinel-data/ba-p/4490214</link><description>One of the many exciting features of the Microsoft Sentinel data lake is a built-in advanced analytics engine, powered by Apache Spark. This Spark cluster has access to data that is within Sentinel data lake, and can work with this data through Jupyter notebooks in Visual Studio Code. As with any...</description><category>Microsoft Sentinel</category><category>Microsoft Security Copilot</category></item><item><title>Granular email content access with unified RBAC – now the default for new Defender tenants</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/granular-email-content-access-with-unified-rbac-now-the-default/ba-p/4505344</link><description>Email investigations are a key part of detecting and responding to phishing and malware. As security workflows continue to evolve, there is an increasing need to align email content visibility more closely with specific roles and scenarios, such as Tier‑1 analysis or specialized workflows like...</description><category>Microsoft Defender for Office 365</category><category>Threat Intelligence</category></item><item><title>How to Manage RC4 Hardening – Definitive Guide</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/how-to-manage-rc4-hardening-definitive-guide/ba-p/4515923</link><description>How to Manage RC4 Hardening – Definitive Guide This article is a technical continuation of the RC4 deprecation / Kerberos hardening work I covered in my previous article last month. If you already went through the “why” (risk of RC4, what changes Microsoft is rolling out, and the high-level...</description><category>General Security</category></item><item><title>General availability of Default Ruleset (DRS) 2.2 for Web Application Firewall</title><link>https://techcommunity.microsoft.com/t5/azure-network-security-blog/general-availability-of-default-ruleset-drs-2-2-for-web/ba-p/4515762</link><description>Introduction As attackers continue to evolve their techniques, organizations require web application security that keeps pace with emerging threats without disrupting legitimate traffic. Azure Web Application Firewall (WAF) continues to evolve to meet these demands and now supports Default Rule Set...</description><category>Threat Intelligence</category></item><item><title>Automating Phishing Email Triage with Microsoft Security Copilot</title><link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/automating-phishing-email-triage-with-microsoft-security-copilot/ba-p/4416559</link><description>This blog details automating phishing email triage using Azure Logic Apps, Azure Function Apps, and Microsoft Security Copilot. Deployable in under 10 minutes, this solution primarily analyzes email intent without relying on traditional indicators of compromise, accurately classifying benign/junk,...</description><category>Microsoft Defender for Office 365</category><category>Microsoft Security Copilot</category><category>Microsoft Sentinel</category></item><item><title>Monthly news - January 2026</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/monthly-news-january-2026/ba-p/4484885</link><description>Microsoft DefenderMonthly news - January 2026 Edition This is our monthly "What's new" blog post, summarizing product updates and various new assets we released over the past month across our Defender products. In this edition, we are looking at all the goodness from December 2025. Defender for...</description><category>Microsoft Defender XDR</category><category>Microsoft Defender for Cloud</category><category>Microsoft Defender for Cloud Apps</category><category>Microsoft Defender for Endpoint</category><category>Microsoft Defender for Identity</category><category>Microsoft Defender for Office 365</category><category>Threat Intelligence</category><category>Microsoft Sentinel</category></item><item><title>Microsoft Ignite 2025: Transforming Phishing Response with Agentic Innovation</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-ignite-2025-transforming-phishing-response-with/ba-p/4470791</link><description>Phishing attacks remain one of the most persistent and damaging threats to organizations worldwide. Security teams are under constant pressure to investigate a growing number of user reported phishing emails daily, ensuring accurate verdicts and timely responses. As threats grow in volume and...</description><category>Microsoft Defender for Office 365</category><category>Microsoft Security Copilot</category></item><item><title>Unlocking human ambition to drive business growth with AI</title><link>https://blogs.microsoft.com/blog/2026/04/28/unlocking-human-ambition-to-drive-business-growth-with-ai/</link><description>As our customers progress toward becoming Frontier Firms, they are using AI not only to optimize how work gets done, but to reinvent their business on the promise of growth. Organizations can now unlock creativity, accelerate innovation and democratize intelligence by bringing Copilots and agents...</description><category>General Security</category></item><item><title>Microsoft Defender: New Advanced hunting enhancements</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/microsoft-defender-new-advanced-hunting-enhancements/ba-p/4514654</link><description>Co-author: Jeremy Tan As a security analyst who actively hunts for critical threats, one of the most frustrating things that can happen is hitting a limit mid-query or encounter an experience that doesn’t behave as expected. The resulting friction and time spent troubleshooting or navigating takes...</description><category>Microsoft Defender XDR</category><category>Microsoft Sentinel</category></item><item><title>Extracting and Auditing Azure DevOps Permissions at Scale with PowerShell</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/extracting-and-auditing-azure-devops-permissions-at-scale-with/ba-p/4515274</link><description>Introduction Azure DevOps organizations accumulate permissions over time. Groups are created, users are added, Entra (Azure AD) groups are nested into project groups, and team structures evolve. For organizations subject to compliance requirements, security reviews, or simply wanting to understand...</description><category>General Security</category></item><item><title>Assess Secure Boot status with Microsoft Defender</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/assess-secure-boot-status-with-microsoft-defender/ba-p/4510356</link><description>Understanding the Secure Boot certificate challenge Secure Boot is a foundational security feature that validates the integrity of your device's boot process, ensuring only trusted software can run during system startup. This protection has been quietly defending enterprise devices since 2012, but...</description><category>Microsoft Defender for Endpoint</category></item><item><title>Microsoft Sovereign Private Cloud scales to thousands of nodes with Azure Local</title><link>https://blogs.microsoft.com/blog/2026/04/27/microsoft-sovereign-private-cloud-scales-to-thousands-of-nodes-with-azure-local/</link><description>Today, I am pleased to announce that Azure Local now scales to support deployments of up to thousands of servers within a single sovereign environment, allowing organizations to run much larger workloads locally across large-footprint datacenters, industrial environments and edge locations while...</description><category>General Security</category></item><item><title>The next phase of the Microsoft-OpenAI partnership</title><link>https://blogs.microsoft.com/blog/2026/04/27/the-next-phase-of-the-microsoft-openai-partnership/</link><description>Amended Agreement Provides Long-Term Clarity The rapid pace of innovation requires us to continue to evolve our partnership to benefit our customers and both companies. Today, we are announcing an amended agreement to simplify our partnership and the way we work together, grounded in flexibility,...</description><category>General Security</category></item><item><title>Designing Outbound Connectivity for "Private Subnets" in Azure</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/designing-outbound-connectivity-for-quot-private-subnets-quot-in/ba-p/4514258</link><description>Why Private Subnets Change Everything Historically, Azure virtual machines relied on default outbound internet access, where the platform automatically assigned a dynamic SNAT IP from a shared pool. This was convenient but problematic: ❌ No deterministic outbound IP addresses ❌ No traffic...</description><category>Threat Intelligence</category><category>Microsoft Sentinel</category></item><item><title>From Oversharing to Enforcement: A Practical Guide to AI Data Security with Microsoft Purview</title><link>https://techcommunity.microsoft.com/t5/microsoft-purview-blog/from-oversharing-to-enforcement-a-practical-guide-to-ai-data/ba-p/4513727</link><description>Why AI Changed the Data Security Problem AI does not create entirely new categories of risk—it supercharges existing ones. Traditional data leakage stems from ordinary behavior: sharing a document too broadly, sending an email to the wrong person, copying regulated data to an uncontrolled device....</description><category>Microsoft Purview</category><category>Microsoft Security Copilot</category></item><item><title>Introducing the Microsoft Sentinel Training Lab. Hands-On Security Operations in Minutes</title><link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/introducing-the-microsoft-sentinel-training-lab-hands-on/ba-p/4513274</link><description>A huge thanks to Paul Kew - this lab wouldn't have been possible without his contributions. Security operations is one of those things that’s hard to learn from slides alone. You need to feel what it’s like to triage a multi-stage incident, tune a noisy detection rule, or trace an attacker pivoting...</description><category>Microsoft Defender XDR</category><category>Microsoft Sentinel</category><category>Threat Intelligence</category></item><item><title>Declutter and Defend: Reducing promotional mail noise with Microsoft Defender</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/declutter-and-defend-reducing-promotional-mail-noise-with/ba-p/4511732</link><description>Enterprise inboxes are overwhelmed with graymail — legitimate, bulk email like newsletters, vendor promotions, and product updates that isn't malicious but buries the messages that matter. When high volumes of these mails land in the inbox, it crowds out priority communications and can dull...</description><category>Microsoft Defender for Office 365</category></item><item><title>Microsoft Sentinel MCP Server with external AI models (Claude) for natural language investigations</title><link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/microsoft-sentinel-mcp-server-with-external-ai-models-claude-for/ba-p/4507013</link><description>Security teams are increasingly exploring how AI assistants support them in investigating incidents, asking questions, and exploring their data. At the same time, controlling how data is accessed remains critical. Today, we’re sharing how Sentinel can support a third-party AI assistant like Claude...</description><category>Microsoft Sentinel</category></item><item><title>From alert overload to decisive action: How Security Copilot agents are transforming security and IT</title><link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/from-alert-overload-to-decisive-action-how-security-copilot/ba-p/4504213</link><description>Security and IT teams operate in a constant stream of alerts, incidents, and investigations. As environments expand across identities, endpoints, cloud, and data, the challenge becomes clear: identifying real risk quickly enough to act. Security Copilot agents bring AI directly into the flow of...</description><category>Microsoft Purview</category><category>Microsoft Security Copilot</category><category>Threat Intelligence</category><category>Microsoft Defender for Endpoint</category><category>Microsoft Sentinel</category></item><item><title>Automate cybersecurity at scale with Microsoft Security Copilot agents</title><link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/automate-cybersecurity-at-scale-with-microsoft-security-copilot/ba-p/4394675</link><description>When we introduced Microsoft Security Copilot last year, we set out to transform the way defenders approach cybersecurity. As one of the industry's first generative AI solutions for security and IT teams, Security Copilot is empowering teams to catch what others miss, respond faster, and strengthen...</description><category>Microsoft Purview</category><category>Microsoft Security Copilot</category><category>Threat Intelligence</category></item><item><title>Security Copilot for SOC: bringing agentic AI to every defender</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/security-copilot-for-soc-bringing-agentic-ai-to-every-defender/ba-p/4470187</link><description>Cybersecurity has entered an era of relentless complexity. As threat actors increasingly leverage artificial intelligence to automate attacks, evade detection, and scale their tactics, defenders are challenged to keep up. In this new era, security operations centers (SOCs) must transform to not...</description><category>Microsoft Defender XDR</category><category>Threat Intelligence</category><category>Microsoft Security Copilot</category><category>Microsoft Sentinel</category></item><item><title>Accelerating Frontier Transformation with Microsoft partners</title><link>https://blogs.microsoft.com/blog/2026/04/21/accelerating-frontier-transformation-with-microsoft-partners/</link><description>AI has moved quickly from experimentation to production. Customers want measurable business outcomes, along with security, governance and responsible AI built in from day one. Microsoft partners are a meaningful differentiator to deliver these objectives. They turn ideas into deployable solutions...</description><category>General Security</category></item><item><title>Strengthening Identity Resilience: A Deep Dive into Microsoft Entra Backup and Recovery</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/strengthening-identity-resilience-a-deep-dive-into-microsoft/ba-p/4513401</link><description>In the modern security landscape, we often say that "Identity is the new perimeter." We spend significant resources on Conditional Access, Phishing-Resistant MFA, and Identity Protection to keep the "bad guys" out. But what happens when the threat is already inside, or when a legitimate...</description><category>General Security</category></item><item><title>Running multimedia AI models on Container Apps with Serverless GPU (A100 &amp; T4)</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/running-multimedia-ai-models-on-container-apps-with-serverless/ba-p/4513063</link><description>A video format is available for watching. Prerequisites - An Azure account with sufficient permissions to create resources. - Terraform installed on your local machine. Infrastructure Provisioning Clone the Github repository and navigate to the project directory. Initialize Terraform and apply the...</description><category>General Security</category></item><item><title>Priority Cleanup V2: Faster, Simpler Data Purging for Exchange Online</title><link>https://techcommunity.microsoft.com/t5/microsoft-purview-blog/priority-cleanup-v2-faster-simpler-data-purging-for-exchange/ba-p/4503363</link><description>Enhancements Achieved with Exchange Priority Cleanup V2 Priority Cleanup (Use priority cleanup to expedite the permanent deletion of sensitive information from mailboxes | Microsoft Learn) was introduced to provide administrators with a powerful tool for permanently deleting mailbox content, even...</description><category>Microsoft Purview</category></item></channel></rss>