<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>Microsoft Security News</title><link>https://security.libredevops.org</link><description>Aggregated Microsoft security news and advisories</description><generator>Microsoft Security News Feed</generator><language>en</language><lastBuildDate>Mon, 18 May 2026 20:05:17 GMT</lastBuildDate><item><title>Agent 365 connector: Monitor, hunt, and investigate AI agent activity in Microsoft Sentinel</title><link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/agent-365-connector-monitor-hunt-and-investigate-ai-agent/ba-p/4520836</link><guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/agent-365-connector-monitor-hunt-and-investigate-ai-agent/ba-p/4520836</guid><description>As enterprises scale the use of AI agents, SOC teams need visibility into AI agent behavior. The Agent 365 connector, now in public preview, streams rich agent telemetry from Agent 365 into Microsoft Sentinel data lake. Agent activity, such as agent data exposure or access drift, is surfaced...</description><dc:creator>RGupta</dc:creator><category>Microsoft Sentinel</category><category>AI Security</category><category>Security Operations</category><category>AI Security</category><category>Governance / Compliance</category><category>SIEM / XDR</category><category>Endpoint Security</category><category>Identity Security</category><pubDate>Mon, 18 May 2026 16:05:15 GMT</pubDate></item><item><title>How to better protect your growing business in an AI-powered world</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/18/how-to-better-protect-your-growing-business-in-an-ai-powered-world/</link><guid>https://www.microsoft.com/en-us/security/blog/2026/05/18/how-to-better-protect-your-growing-business-in-an-ai-powered-world/</guid><description>See how built-in security helps keep your growing business running, protect customer trust, and support growth. The post How to better protect your growing business in an AI-powered world appeared first on Microsoft Security Blog.</description><dc:creator>Alym Rayani</dc:creator><category>General Security</category><category>General Security</category><pubDate>Mon, 18 May 2026 16:00:00 GMT</pubDate></item><item><title>Introducing selective response actions for high-value assets in Microsoft Defender</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/introducing-selective-response-actions-for-high-value-assets-in/ba-p/4512175</link><guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/introducing-selective-response-actions-for-high-value-assets-in/ba-p/4512175</guid><description>Deploying Microsoft Defender on high-value assets (HVAs) such as domain controllers, ADFS servers, and other Tier-0 systems, requires a thoughtful approach to balance strong protection with operational stability. Given the powerful response capabilities available, organizations often seek greater...</description><dc:creator>amibarayev</dc:creator><category>Microsoft Defender for Endpoint</category><category>Endpoint Security</category><category>Governance / Compliance</category><pubDate>Mon, 18 May 2026 15:50:40 GMT</pubDate></item><item><title>CVE-2026-32185 Microsoft Teams Spoofing Vulnerability</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32185</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32185</guid><description>The security update for Microsoft Teams for Android is not immediately available. Customers running affected Microsoft Teams for would need to install the update to be protected from this vulnerability, once the update becomes available.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Mon, 18 May 2026 14:00:00 GMT</pubDate></item><item><title>CVE-2026-42897 Microsoft Exchange Server Spoofing Vulnerability</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42897</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42897</guid><description>Updated FAQ information. This is an informational change only.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Mon, 18 May 2026 14:00:00 GMT</pubDate></item><item><title>CVE-2026-42822 Azure Local Disconnected Operations (ALDO) Elevation of Privilege Vulnerability</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42822</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42822</guid><description>Improper authentication in Azure Local Disconnected Operations allows an unauthorized attacker to elevate privileges over a network.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Mon, 18 May 2026 14:00:00 GMT</pubDate></item><item><title>CVE-2026-32177 .NET Elevation of Privilege Vulnerability</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32177</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32177</guid><description>Update the Security Updates table to remove incorrectly added software</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Mon, 18 May 2026 14:00:00 GMT</pubDate></item><item><title>CVE-2026-43308 btrfs: don't BUG() on unexpected delayed ref type in run_one_delayed_ref()</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43308</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-43308</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Mon, 18 May 2026 08:39:12 GMT</pubDate></item><item><title>Build a Local Microsoft Sentinel Triage Agent in VS Code (Copilot + MCP)</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/build-a-local-microsoft-sentinel-triage-agent-in-vs-code-copilot/ba-p/4520486</link><guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/build-a-local-microsoft-sentinel-triage-agent-in-vs-code-copilot/ba-p/4520486</guid><description>Modern SOC work is not limited by data—it’s limited by the friction of collecting it. This post shows a local-first workflow that lets you investigate Microsoft Sentinel incidents from inside VS Code using GitHub Copilot Chat for reasoning and a small, deterministic MCP toolset for evidence...</description><dc:creator>absharan</dc:creator><category>Microsoft Entra</category><category>Microsoft Sentinel</category><category>Identity Security</category><category>SIEM / XDR</category><category>Threat Intelligence</category><category>Security Operations</category><pubDate>Mon, 18 May 2026 04:28:02 GMT</pubDate></item><item><title>CVE-2026-8328 FTP PASV SSRF, ftpcp() does not use actual peer address, trusts server-supplied PASV host address</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-8328</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-8328</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Sun, 17 May 2026 08:01:51 GMT</pubDate></item><item><title>CVE-2026-8368 LWP::UserAgent versions before 6.83 for Perl leak Authorization and Proxy-Authorization headers on cross-origin redirects</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-8368</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-8368</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Sun, 17 May 2026 08:01:34 GMT</pubDate></item><item><title>CVE-2026-7210 The expat and elementtree parsers use insufficient entropy for XML hash-flooding protection</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-7210</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-7210</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Sun, 17 May 2026 08:01:28 GMT</pubDate></item><item><title>CVE-2026-44283 etcd: Read access via PrevKv in etcd transactions may bypass RBAC authorization checks</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-44283</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-44283</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Sun, 17 May 2026 08:01:23 GMT</pubDate></item><item><title>CVE-2026-46483 Vim: Command injection in tar#Vimuntar via missing shellescape {special} flag</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-46483</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-46483</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Sun, 17 May 2026 08:01:17 GMT</pubDate></item><item><title>CVE-2026-44662 rust-openssl: Heap buffer overflow when encrypting with AES key-wrap-with-padding</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-44662</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-44662</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Sat, 16 May 2026 08:05:37 GMT</pubDate></item><item><title>CVE-2026-42946 NGINX ngx_http_scgi_module and ngx_http_uwsgi_module vulnerability</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42946</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42946</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Sat, 16 May 2026 08:05:06 GMT</pubDate></item><item><title>CVE-2026-42934 NGINX ngx_http_charset_module vulnerability</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42934</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42934</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Sat, 16 May 2026 08:04:55 GMT</pubDate></item><item><title>CVE-2026-40460 NGINX ngx_quic_module vulnerability</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40460</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40460</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Sat, 16 May 2026 08:04:45 GMT</pubDate></item><item><title>CVE-2026-6477 PostgreSQL libpq lo_* functions let server superuser overwrite client stack memory</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6477</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6477</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Sat, 16 May 2026 08:04:33 GMT</pubDate></item><item><title>CVE-2026-6637 PostgreSQL refint allows stack buffer overflow and SQL injection</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6637</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6637</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Sat, 16 May 2026 08:04:28 GMT</pubDate></item><item><title>CVE-2026-6638 PostgreSQL REFRESH PUBLICATION allows SQL injection via table name</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6638</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6638</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Sat, 16 May 2026 08:04:06 GMT</pubDate></item><item><title>CVE-2026-6473 PostgreSQL server undersizes allocations, via integer wraparound</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6473</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6473</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Sat, 16 May 2026 08:04:00 GMT</pubDate></item><item><title>CVE-2026-6478 PostgreSQL discloses MD5-hashed passwords via covert timing channel</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6478</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6478</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Sat, 16 May 2026 08:03:55 GMT</pubDate></item><item><title>CVE-2026-44673 libyang: lyb_read_string() integer overflow → heap buffer overflow</title><link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-44673</link><guid>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-44673</guid><description>Information published.</description><dc:creator>Microsoft</dc:creator><category>Microsoft Security Response Center</category><category>Vulnerability Management</category><pubDate>Sat, 16 May 2026 08:03:48 GMT</pubDate></item><item><title>How Microsoft Defender used predictive shielding to proactively disrupt a ransomware attack</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/how-microsoft-defender-used-predictive-shielding-to-proactively/ba-p/4519498</link><guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/how-microsoft-defender-used-predictive-shielding-to-proactively/ba-p/4519498</guid><description>Modern ransomware attacks are increasingly designed to blend in with normal IT operations, using trusted administrative tools to quietly weaken defenses and distribute malicious payloads at scale. In a recent real‑world incident, a human‑operated ransomware actor attempted to do exactly that by...</description><dc:creator>AvivSharon</dc:creator><category>Microsoft Defender for Endpoint</category><category>Endpoint Security</category><pubDate>Thu, 14 May 2026 17:01:07 GMT</pubDate></item><item><title>Defense in depth for autonomous AI agents</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/14/defense-in-depth-autonomous-ai-agents/</link><guid>https://www.microsoft.com/en-us/security/blog/2026/05/14/defense-in-depth-autonomous-ai-agents/</guid><description>As AI agents gain autonomy, defense in depth must evolve, with application-layer design, identity, and human oversight at the center. The post Defense in depth for autonomous AI agents appeared first on Microsoft Security Blog.</description><dc:creator>Alyssa Ofstein and Elliot H Omiya</dc:creator><category>General Security</category><category>Identity Security</category><pubDate>Thu, 14 May 2026 16:00:00 GMT</pubDate></item><item><title>Kazuar: Anatomy of a nation-state botnet</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/14/kazuar-anatomy-of-a-nation-state-botnet/</link><guid>https://www.microsoft.com/en-us/security/blog/2026/05/14/kazuar-anatomy-of-a-nation-state-botnet/</guid><description>Kazuar, a sophisticated malware family attributed to the Russian state actor Secret Blizzard, has been under constant development for years and continues to evolve in support of espionage-focused operations. Over time, Kazuar has expanded from a relatively traditional backdoor into a highly modular...</description><dc:creator>Microsoft Threat Intelligence</dc:creator><category>General Security</category><category>Threat Intelligence</category><pubDate>Thu, 14 May 2026 15:00:00 GMT</pubDate></item><item><title>When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/14/configuration-becomes-vulnerability-exploitable-misconfigurations-ai-apps/</link><guid>https://www.microsoft.com/en-us/security/blog/2026/05/14/configuration-becomes-vulnerability-exploitable-misconfigurations-ai-apps/</guid><description>Exposed UIs, weak authentication, and risky defaults could turn cloud-native AI apps on Kubernetes into potential targets by threat actors. Learn how exploitable misconfigurations lead to RCE and data leaks. The post When configuration becomes a vulnerability: Exploitable misconfigurations in AI...</description><dc:creator>Microsoft Defender Security Research Team and Yossi Weizman</dc:creator><category>General Security</category><category>Vulnerability Management</category><pubDate>Thu, 14 May 2026 14:20:55 GMT</pubDate></item><item><title>TLS Certificate Pinning and Best Practices in Azure Open-Source Relational Databases</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/tls-certificate-pinning-and-best-practices-in-azure-open-source/ba-p/4519531</link><guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/tls-certificate-pinning-and-best-practices-in-azure-open-source/ba-p/4519531</guid><description>TLS certificate pinning in Azure Database for PostgreSQL and MySQL Transport Layer Security (TLS) encrypts data in transit between client applications and the server and authenticates the service endpoint in client-server authentication. Azure Database server certificates are issued by well-known...</description><dc:creator>TameikaL</dc:creator><category>General Security</category><category>Identity Security</category><category>Endpoint Security</category><category>Governance / Compliance</category><pubDate>Thu, 14 May 2026 00:53:22 GMT</pubDate></item><item><title>Check This Out! (CTO!) Guide (April 2026)</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/check-this-out-cto-guide-april-2026/ba-p/4519149</link><guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/check-this-out-cto-guide-april-2026/ba-p/4519149</guid><description>Member: TysonPaul | Microsoft Community Hub Announcing Public Preview for Essential Machine Management Team Blog: Azure Governance and Management Author: Meagan McCrory Published: 04/06/2026 Summary: Microsoft has announced the public preview of Essential Machine Management within Azure’s Compute...</description><dc:creator>TysonPaul</dc:creator><category>Microsoft Intune</category><category>Microsoft Entra</category><category>Identity Security</category><category>Incident Response</category><category>Governance / Compliance</category><category>Threat Intelligence</category><category>Endpoint Security</category><category>Security Operations</category><category>Vulnerability Management</category><pubDate>Wed, 13 May 2026 03:25:05 GMT</pubDate></item><item><title>Accelerating detection engineering using AI-assisted synthetic attack logs generation</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/12/accelerating-detection-engineering-using-ai-assisted-synthetic-attack-logs-generation/</link><guid>https://www.microsoft.com/en-us/security/blog/2026/05/12/accelerating-detection-engineering-using-ai-assisted-synthetic-attack-logs-generation/</guid><description>What if you could generate realistic attack telemetry on demand? Explore research methods that translate attacker behaviors (TTPs) into synthetic logs that can trigger detections at scale and without sensitive data. The post Accelerating detection engineering using AI-assisted synthetic attack logs...</description><dc:creator>Microsoft Defender Security Research Team</dc:creator><category>General Security</category><category>Security Operations</category><pubDate>Tue, 12 May 2026 22:53:09 GMT</pubDate></item><item><title>Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/12/defense-at-ai-speed-microsofts-new-multi-model-agentic-security-system-tops-leading-industry-benchmark/</link><guid>https://www.microsoft.com/en-us/security/blog/2026/05/12/defense-at-ai-speed-microsofts-new-multi-model-agentic-security-system-tops-leading-industry-benchmark/</guid><description>Today Microsoft is announcing a major step forward in AI-powered cyber defense: a new multi-model agentic scanning harness (codenamed MDASH). The post Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark appeared first on Microsoft Security Blog.</description><dc:creator>Taesoo Kim</dc:creator><category>General Security</category><category>General Security</category><pubDate>Tue, 12 May 2026 22:00:00 GMT</pubDate></item><item><title>Defending consumer web properties against modern DDoS attacks</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/12/defending-consumer-web-properties-against-modern-ddos-attacks/</link><guid>https://www.microsoft.com/en-us/security/blog/2026/05/12/defending-consumer-web-properties-against-modern-ddos-attacks/</guid><description>Read how to protect consumer websites and defend against modern DDoS attacks with layered security, resilient architecture, and graceful service degradation. The post Defending consumer web properties against modern DDoS attacks appeared first on Microsoft Security Blog.</description><dc:creator>Kumar Srinivasamurthy</dc:creator><category>General Security</category><category>General Security</category><pubDate>Tue, 12 May 2026 16:00:00 GMT</pubDate></item><item><title>Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/12/undermining-the-trust-boundary-investigating-a-stealthy-intrusion-through-third-party-compromise/</link><guid>https://www.microsoft.com/en-us/security/blog/2026/05/12/undermining-the-trust-boundary-investigating-a-stealthy-intrusion-through-third-party-compromise/</guid><description>Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend seamlessly into routine operations and remain undetected demonstrating that intrusions have increasingly avoided using noisy exploits, obvious malware, or custom tooling,...</description><dc:creator>Microsoft Incident Response</dc:creator><category>General Security</category><category>Incident Response</category><category>Threat Intelligence</category><pubDate>Tue, 12 May 2026 15:00:00 GMT</pubDate></item><item><title>Triggering Azure Functions from Blob Storage Using Event Grid</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/triggering-azure-functions-from-blob-storage-using-event-grid/ba-p/4518184</link><guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/triggering-azure-functions-from-blob-storage-using-event-grid/ba-p/4518184</guid><description>Overview Modern workloads increasingly rely on reacting to files as soon as they arrive in Azure Blob Storage. While Azure provides multiple ways to trigger computing from blob operations, choosing the right event-driven pattern is not always straightforward—especially in enterprise environments...</description><dc:creator>AndrewCoughlin</dc:creator><category>General Security</category><category>Endpoint Security</category><pubDate>Mon, 11 May 2026 20:24:17 GMT</pubDate></item><item><title>What’s new in Microsoft Sentinel: RSAC 2026</title><link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-in-microsoft-sentinel-rsac-2026/ba-p/4503971</link><guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-in-microsoft-sentinel-rsac-2026/ba-p/4503971</guid><description>Security is entering a new era, one defined by explosive data growth, increasingly sophisticated threats, and the rise of AI-enabled operations. To keep pace, security teams need an AI-powered approach to collect, reason over, and act on security data at scale. At RSA Conference 2026 (RSAC), we’re...</description><dc:creator>spalani</dc:creator><category>Microsoft Sentinel</category><category>Microsoft Purview</category><category>Microsoft Entra</category><category>SIEM / XDR</category><category>Security Operations</category><category>Governance / Compliance</category><category>Threat Intelligence</category><category>Identity Security</category><category>Email Security</category><pubDate>Mon, 11 May 2026 16:13:09 GMT</pubDate></item><item><title>Active attack: Dirty Frag Linux vulnerability expands post-compromise risk</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/08/active-attack-dirty-frag-linux-vulnerability-expands-post-compromise-risk/</link><guid>https://www.microsoft.com/en-us/security/blog/2026/05/08/active-attack-dirty-frag-linux-vulnerability-expands-post-compromise-risk/</guid><description>Dirty Frag is a newly disclosed Linux local privilege escalation vulnerability affecting kernel networking and memory-fragment handling components including esp4, esp6, and rxrpc. The vulnerability enables reliable escalation from an unprivileged user to root and may be leveraged after initial...</description><dc:creator>Microsoft Defender Security Research Team</dc:creator><category>General Security</category><category>Vulnerability Management</category><pubDate>Fri, 08 May 2026 17:12:46 GMT</pubDate></item><item><title>When prompts become shells: RCE vulnerabilities in AI agent frameworks</title><link>https://www.microsoft.com/en-us/security/blog/2026/05/07/prompts-become-shells-rce-vulnerabilities-ai-agent-frameworks/</link><guid>https://www.microsoft.com/en-us/security/blog/2026/05/07/prompts-become-shells-rce-vulnerabilities-ai-agent-frameworks/</guid><description>New research exposes how prompt injection in AI agent frameworks can lead to remote code execution. Learn how these vulnerabilities work, what’s impacted, and how to secure your agents. The post When prompts become shells: RCE vulnerabilities in AI agent frameworks appeared first on Microsoft...</description><dc:creator>Microsoft Defender Security Research Team, Uri Oren, Amit Eliahu and Dor Edry</dc:creator><category>AI Security</category><category>AI Security</category><pubDate>Thu, 07 May 2026 20:22:39 GMT</pubDate></item><item><title>Better together with Azure WAF + Microsoft Defender for Storage + Defender for Azure SQL Databases</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/better-together-with-azure-waf-microsoft-defender-for-storage/ba-p/4517101</link><guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/better-together-with-azure-waf-microsoft-defender-for-storage/ba-p/4517101</guid><description>Authored by: Fernanda_Vela​ , saikishor​, Yura_Lee​ Reviewed by: YuriDiogenes​, Mohit_Kumar​, Amir_Dahan​, eitanbremler​ , Kitt_Weatherman​ Introduction Often, customers ask why additional workload protection is needed when a web application firewall is already in place. Azure Web Application...</description><dc:creator>Yura_Lee</dc:creator><category>Microsoft Defender for Cloud</category><category>Cloud Security</category><category>Threat Intelligence</category><category>Security Operations</category><category>Email Security</category><category>Identity Security</category><pubDate>Wed, 06 May 2026 17:22:23 GMT</pubDate></item><item><title>Extending Sentinel Data Integration: Azure Blob Storage Support for CCF Connectors</title><link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/extending-sentinel-data-integration-azure-blob-storage-support/ba-p/4516896</link><guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/extending-sentinel-data-integration-azure-blob-storage-support/ba-p/4516896</guid><description>As organizations scale their security operations, the ability to ingest, process, and analyze high volumes of data reliably becomes increasingly critical. Microsoft Sentinel continues to expand its ecosystem through the Codeless Connector Framework (CCF), enabling ISVs to build and deliver...</description><dc:creator>JesseKopavi</dc:creator><category>Microsoft Sentinel</category><category>Incident Response</category><category>SIEM / XDR</category><category>Security Operations</category><pubDate>Tue, 05 May 2026 16:00:00 GMT</pubDate></item><item><title>How Frontier Firms are rebuilding the operating model for the age of AI</title><link>https://blogs.microsoft.com/blog/2026/05/05/how-frontier-firms-are-rebuilding-the-operating-model-for-the-age-of-ai/</link><guid>https://blogs.microsoft.com/blog/2026/05/05/how-frontier-firms-are-rebuilding-the-operating-model-for-the-age-of-ai/</guid><description>Updated May 11, 2026: The post was updated to reflect that third-party plugins will be available starting May 12, 2026. Spend time with any software engineering team right now and you’ll see something worth paying attention to. Over the last few years, the way software gets built has moved through...</description><dc:creator>Jared Spataro</dc:creator><category>General Security</category><category>General Security</category><pubDate>Tue, 05 May 2026 10:00:01 GMT</pubDate></item><item><title>What’s new in Microsoft Sentinel: April 2026</title><link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-in-microsoft-sentinel-april-2026/ba-p/4516354</link><guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-in-microsoft-sentinel-april-2026/ba-p/4516354</guid><description>Welcome to the April 2026 edition of What's new in Microsoft Sentinel. April brings a broad set of updates, with RSAC 2026 announcements rolling out alongside new features. Highlights include cost limit enforcement to prevent runaway query costs, curated open-source intelligence in Threat...</description><dc:creator>vkokkengada</dc:creator><category>Microsoft Sentinel</category><category>Microsoft Entra</category><category>SIEM / XDR</category><category>Security Operations</category><category>Identity Security</category><category>Threat Intelligence</category><category>Governance / Compliance</category><pubDate>Mon, 04 May 2026 21:55:19 GMT</pubDate></item><item><title>Microsoft Defender for Cloud Customer Newsletter</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/microsoft-defender-for-cloud-customer-newsletter/ba-p/4516842</link><guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/microsoft-defender-for-cloud-customer-newsletter/ba-p/4516842</guid><description>What's new in Defender for Cloud? Container runtime anti-malware detection and blocking and DNS Detection for Kubernetes is now GA in Defender for Containers for AKS, EKS, and GKE. Learn more about these announcements here and here. Defender for Storage integration in Azure Portal Storage Center...</description><dc:creator>Yura_Lee</dc:creator><category>Microsoft Defender for Cloud</category><category>Cloud Security</category><category>Threat Intelligence</category><pubDate>Mon, 04 May 2026 16:47:10 GMT</pubDate></item><item><title>Monthly news - May 2026</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/monthly-news-may-2026/ba-p/4516764</link><guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/monthly-news-may-2026/ba-p/4516764</guid><description>Microsoft DefenderMonthly news - May 2026 Edition This is our monthly "What's new" blog post, summarizing product updates and various new assets we released over the past month across our Defender products. In this edition, we are looking at all the goodness from April 2026. We are now including...</description><dc:creator>HeikeRitter</dc:creator><category>Microsoft Defender XDR</category><category>Microsoft Defender for Identity</category><category>Microsoft Defender for Endpoint</category><category>Microsoft Sentinel</category><category>Microsoft Defender for Office 365</category><category>Microsoft Entra</category><category>Microsoft Defender for Cloud</category><category>Microsoft Purview</category><category>SIEM / XDR</category><category>Endpoint Security</category><category>Cloud Security</category><category>Vulnerability Management</category><category>Email Security</category><category>Governance / Compliance</category><category>Identity Security</category><category>Security Operations</category><pubDate>Mon, 04 May 2026 15:24:34 GMT</pubDate></item><item><title>Purpose For Your PKI (Practical PKI Part 3)</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/purpose-for-your-pki-practical-pki-part-3/ba-p/4512518</link><guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/purpose-for-your-pki-practical-pki-part-3/ba-p/4512518</guid><description>My name is Ron Arestia, and I am a Security Researcher with Microsoft’s Detection and Response Team (DART). We respond to customer cybersecurity incidents to assist with containment and recovery from threat actors. In this brief blog post, we will discuss the “why” behind your PKI. This is part 3...</description><dc:creator>RonArestia</dc:creator><category>General Security</category><category>Identity Security</category><category>Endpoint Security</category><category>Incident Response</category><category>Threat Intelligence</category><pubDate>Mon, 04 May 2026 04:00:00 GMT</pubDate></item><item><title>Public Preview: Managed Identity support for graphical session recording</title><link>https://techcommunity.microsoft.com/t5/azure-network-security-blog/public-preview-managed-identity-support-for-graphical-session/ba-p/4513139</link><guid>https://techcommunity.microsoft.com/t5/azure-network-security-blog/public-preview-managed-identity-support-for-graphical-session/ba-p/4513139</guid><description>Overview Azure Bastion provides secure RDP and SSH access to Azure virtual machines directly via the Azure portal or via the native SSH/RDP client already installed on your local computer. Today, we are introducing public preview for managed identity support for session recording, giving...</description><dc:creator>aarontsang</dc:creator><category>Microsoft Entra</category><category>Identity Security</category><pubDate>Thu, 30 Apr 2026 14:05:12 GMT</pubDate></item><item><title>Hardening OpenClaw on AKS: Mitigating Container Escapes with Kata microVM Isolation</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/hardening-openclaw-on-aks-mitigating-container-escapes-with-kata/ba-p/4516030</link><guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/hardening-openclaw-on-aks-mitigating-container-escapes-with-kata/ba-p/4516030</guid><description>What is OpenClaw, and what security challenges does it pose with container escapes? OpenClaw is an open-source autonomous AI agent designed for power users and developers to automate tasks, such as managing emails, files, and scheduling via chat apps like WhatsApp or Telegram. While OpenClaw...</description><dc:creator>jianshn</dc:creator><category>AI Security</category><category>Vulnerability Management</category><category>AI Security</category><category>Identity Security</category><category>Endpoint Security</category><pubDate>Thu, 30 Apr 2026 01:57:02 GMT</pubDate></item><item><title>Use Data Wrangler to Streamline Your Microsoft Sentinel data lake Notebook Development</title><link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/use-data-wrangler-to-streamline-your-microsoft-sentinel-data/ba-p/4490214</link><guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/use-data-wrangler-to-streamline-your-microsoft-sentinel-data/ba-p/4490214</guid><description>One of the many exciting features of the Microsoft Sentinel data lake is a built-in advanced analytics engine, powered by Apache Spark. This Spark cluster has access to data that is within Sentinel data lake, and can work with this data through Jupyter notebooks in Visual Studio Code. As with any...</description><dc:creator>David Hoerster</dc:creator><category>Microsoft Sentinel</category><category>Microsoft Security Copilot</category><category>AI Security</category><category>SIEM / XDR</category><category>Identity Security</category><category>Security Operations</category><pubDate>Wed, 29 Apr 2026 19:18:17 GMT</pubDate></item><item><title>Granular email content access with unified RBAC – now the default for new Defender tenants</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/granular-email-content-access-with-unified-rbac-now-the-default/ba-p/4505344</link><guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/granular-email-content-access-with-unified-rbac-now-the-default/ba-p/4505344</guid><description>Email investigations are a key part of detecting and responding to phishing and malware. As security workflows continue to evolve, there is an increasing need to align email content visibility more closely with specific roles and scenarios, such as Tier‑1 analysis or specialized workflows like...</description><dc:creator>VipulPandey</dc:creator><category>Microsoft Defender for Office 365</category><category>Microsoft Entra</category><category>Email Security</category><category>Incident Response</category><category>Security Operations</category><category>Identity Security</category><category>Threat Intelligence</category><category>Endpoint Security</category><pubDate>Wed, 29 Apr 2026 16:00:00 GMT</pubDate></item><item><title>How to Manage RC4 Hardening – Definitive Guide</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/how-to-manage-rc4-hardening-definitive-guide/ba-p/4515923</link><guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/how-to-manage-rc4-hardening-definitive-guide/ba-p/4515923</guid><description>How to Manage RC4 Hardening – Definitive Guide This article is a technical continuation of the RC4 deprecation / Kerberos hardening work I covered in my previous article last month. If you already went through the “why” (risk of RC4, what changes Microsoft is rolling out, and the high-level...</description><dc:creator>Elanor92</dc:creator><category>General Security</category><category>Vulnerability Management</category><category>Identity Security</category><category>SIEM / XDR</category><pubDate>Wed, 29 Apr 2026 15:59:22 GMT</pubDate></item><item><title>General availability of Default Ruleset (DRS) 2.2 for Web Application Firewall</title><link>https://techcommunity.microsoft.com/t5/azure-network-security-blog/general-availability-of-default-ruleset-drs-2-2-for-web/ba-p/4515762</link><guid>https://techcommunity.microsoft.com/t5/azure-network-security-blog/general-availability-of-default-ruleset-drs-2-2-for-web/ba-p/4515762</guid><description>Introduction As attackers continue to evolve their techniques, organizations require web application security that keeps pace with emerging threats without disrupting legitimate traffic. Azure Web Application Firewall (WAF) continues to evolve to meet these demands and now supports Default Rule Set...</description><dc:creator>andrewmathu</dc:creator><category>General Security</category><category>Threat Intelligence</category><pubDate>Wed, 29 Apr 2026 08:31:47 GMT</pubDate></item><item><title>Automating Phishing Email Triage with Microsoft Security Copilot</title><link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/automating-phishing-email-triage-with-microsoft-security-copilot/ba-p/4416559</link><guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/automating-phishing-email-triage-with-microsoft-security-copilot/ba-p/4416559</guid><description>This blog details automating phishing email triage using Azure Logic Apps, Azure Function Apps, and Microsoft Security Copilot. Deployable in under 10 minutes, this solution primarily analyzes email intent without relying on traditional indicators of compromise, accurately classifying benign/junk,...</description><dc:creator>craigfreyman-msft</dc:creator><category>Microsoft Defender for Office 365</category><category>Microsoft Security Copilot</category><category>Microsoft Sentinel</category><category>Email Security</category><category>AI Security</category><category>SIEM / XDR</category><category>Security Operations</category><category>Governance / Compliance</category><pubDate>Wed, 29 Apr 2026 03:50:49 GMT</pubDate></item><item><title>Monthly news - January 2026</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/monthly-news-january-2026/ba-p/4484885</link><guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/monthly-news-january-2026/ba-p/4484885</guid><description>Microsoft DefenderMonthly news - January 2026 Edition This is our monthly "What's new" blog post, summarizing product updates and various new assets we released over the past month across our Defender products. In this edition, we are looking at all the goodness from December 2025. Defender for...</description><dc:creator>HeikeRitter</dc:creator><category>Microsoft Defender for Office 365</category><category>Microsoft Defender XDR</category><category>Microsoft Defender for Cloud</category><category>Microsoft Defender for Cloud Apps</category><category>Microsoft Defender for Endpoint</category><category>Microsoft Defender for Identity</category><category>Microsoft Intune</category><category>Microsoft Sentinel</category><category>Email Security</category><category>SIEM / XDR</category><category>Endpoint Security</category><category>Cloud Security</category><category>Security Operations</category><category>Threat Intelligence</category><category>Identity Security</category><category>Vulnerability Management</category><pubDate>Tue, 28 Apr 2026 23:33:54 GMT</pubDate></item><item><title>Microsoft Ignite 2025: Transforming Phishing Response with Agentic Innovation</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-ignite-2025-transforming-phishing-response-with/ba-p/4470791</link><guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-ignite-2025-transforming-phishing-response-with/ba-p/4470791</guid><description>Phishing attacks remain one of the most persistent and damaging threats to organizations worldwide. Security teams are under constant pressure to investigate a growing number of user reported phishing emails daily, ensuring accurate verdicts and timely responses. As threats grow in volume and...</description><dc:creator>JeffreyPinkston</dc:creator><category>Microsoft Defender for Office 365</category><category>Microsoft Security Copilot</category><category>Email Security</category><category>AI Security</category><category>Security Operations</category><category>Identity Security</category><pubDate>Tue, 28 Apr 2026 23:31:24 GMT</pubDate></item><item><title>Unlocking human ambition to drive business growth with AI</title><link>https://blogs.microsoft.com/blog/2026/04/28/unlocking-human-ambition-to-drive-business-growth-with-ai/</link><guid>https://blogs.microsoft.com/blog/2026/04/28/unlocking-human-ambition-to-drive-business-growth-with-ai/</guid><description>As our customers progress toward becoming Frontier Firms, they are using AI not only to optimize how work gets done, but to reinvent their business on the promise of growth. Organizations can now unlock creativity, accelerate innovation and democratize intelligence by bringing Copilots and agents...</description><dc:creator>Judson Althoff</dc:creator><category>General Security</category><category>General Security</category><pubDate>Tue, 28 Apr 2026 17:34:47 GMT</pubDate></item><item><title>Microsoft Defender: New Advanced hunting enhancements</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/microsoft-defender-new-advanced-hunting-enhancements/ba-p/4514654</link><guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/microsoft-defender-new-advanced-hunting-enhancements/ba-p/4514654</guid><description>Co-author: Jeremy Tan As a security analyst who actively hunts for critical threats, one of the most frustrating things that can happen is hitting a limit mid-query or encounter an experience that doesn’t behave as expected. The resulting friction and time spent troubleshooting or navigating takes...</description><dc:creator>Noa_Nutkevitch</dc:creator><category>Microsoft Defender XDR</category><category>Microsoft Sentinel</category><category>SIEM / XDR</category><category>Incident Response</category><category>Security Operations</category><pubDate>Tue, 28 Apr 2026 16:45:15 GMT</pubDate></item><item><title>Extracting and Auditing Azure DevOps Permissions at Scale with PowerShell</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/extracting-and-auditing-azure-devops-permissions-at-scale-with/ba-p/4515274</link><guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/extracting-and-auditing-azure-devops-permissions-at-scale-with/ba-p/4515274</guid><description>Introduction Azure DevOps organizations accumulate permissions over time. Groups are created, users are added, Entra (Azure AD) groups are nested into project groups, and team structures evolve. For organizations subject to compliance requirements, security reviews, or simply wanting to understand...</description><dc:creator>skissel</dc:creator><category>Microsoft Entra</category><category>Identity Security</category><category>Governance / Compliance</category><category>Endpoint Security</category><pubDate>Tue, 28 Apr 2026 06:38:27 GMT</pubDate></item><item><title>Assess Secure Boot status with Microsoft Defender</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/assess-secure-boot-status-with-microsoft-defender/ba-p/4510356</link><guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/assess-secure-boot-status-with-microsoft-defender/ba-p/4510356</guid><description>Understanding the Secure Boot certificate challenge Secure Boot is a foundational security feature that validates the integrity of your device's boot process, ensuring only trusted software can run during system startup. This protection has been quietly defending enterprise devices since 2012, but...</description><dc:creator>amitcohen</dc:creator><category>Microsoft Defender for Endpoint</category><category>Endpoint Security</category><pubDate>Mon, 27 Apr 2026 16:38:22 GMT</pubDate></item><item><title>Microsoft Sovereign Private Cloud scales to thousands of nodes with Azure Local</title><link>https://blogs.microsoft.com/blog/2026/04/27/microsoft-sovereign-private-cloud-scales-to-thousands-of-nodes-with-azure-local/</link><guid>https://blogs.microsoft.com/blog/2026/04/27/microsoft-sovereign-private-cloud-scales-to-thousands-of-nodes-with-azure-local/</guid><description>Today, I am pleased to announce that Azure Local now scales to support deployments of up to thousands of servers within a single sovereign environment, allowing organizations to run much larger workloads locally across large-footprint datacenters, industrial environments and edge locations while...</description><dc:creator>Douglas Phillips</dc:creator><category>General Security</category><category>General Security</category><pubDate>Mon, 27 Apr 2026 16:00:03 GMT</pubDate></item><item><title>The next phase of the Microsoft-OpenAI partnership</title><link>https://blogs.microsoft.com/blog/2026/04/27/the-next-phase-of-the-microsoft-openai-partnership/</link><guid>https://blogs.microsoft.com/blog/2026/04/27/the-next-phase-of-the-microsoft-openai-partnership/</guid><description>Amended Agreement Provides Long-Term Clarity The rapid pace of innovation requires us to continue to evolve our partnership to benefit our customers and both companies. Today, we are announcing an amended agreement to simplify our partnership and the way we work together, grounded in flexibility,...</description><dc:creator>Microsoft Corporate Blogs</dc:creator><category>General Security</category><category>General Security</category><pubDate>Mon, 27 Apr 2026 13:00:02 GMT</pubDate></item><item><title>Designing Outbound Connectivity for "Private Subnets" in Azure</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/designing-outbound-connectivity-for-quot-private-subnets-quot-in/ba-p/4514258</link><guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/designing-outbound-connectivity-for-quot-private-subnets-quot-in/ba-p/4514258</guid><description>Why Private Subnets Change Everything Historically, Azure virtual machines relied on default outbound internet access, where the platform automatically assigned a dynamic SNAT IP from a shared pool. This was convenient but problematic: ❌ No deterministic outbound IP addresses ❌ No traffic...</description><dc:creator>alexeyn1</dc:creator><category>Microsoft Sentinel</category><category>Governance / Compliance</category><category>SIEM / XDR</category><category>Security Operations</category><category>Threat Intelligence</category><pubDate>Thu, 23 Apr 2026 21:28:09 GMT</pubDate></item><item><title>Introducing the Microsoft Sentinel Training Lab. Hands-On Security Operations in Minutes</title><link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/introducing-the-microsoft-sentinel-training-lab-hands-on/ba-p/4513274</link><guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/introducing-the-microsoft-sentinel-training-lab-hands-on/ba-p/4513274</guid><description>A huge thanks to Paul Kew - this lab wouldn't have been possible without his contributions. Security operations is one of those things that’s hard to learn from slides alone. You need to feel what it’s like to triage a multi-stage incident, tune a noisy detection rule, or trace an attacker pivoting...</description><dc:creator>AndreasKapetaniou</dc:creator><category>Microsoft Defender XDR</category><category>Microsoft Sentinel</category><category>Security Operations</category><category>SIEM / XDR</category><category>Threat Intelligence</category><category>Endpoint Security</category><category>Email Security</category><category>Identity Security</category><pubDate>Thu, 23 Apr 2026 08:50:24 GMT</pubDate></item><item><title>Declutter and Defend: Reducing promotional mail noise with Microsoft Defender</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/declutter-and-defend-reducing-promotional-mail-noise-with/ba-p/4511732</link><guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/declutter-and-defend-reducing-promotional-mail-noise-with/ba-p/4511732</guid><description>Enterprise inboxes are overwhelmed with graymail — legitimate, bulk email like newsletters, vendor promotions, and product updates that isn't malicious but buries the messages that matter. When high volumes of these mails land in the inbox, it crowds out priority communications and can dull...</description><dc:creator>FaithEbenezerOquong</dc:creator><category>Microsoft Defender for Office 365</category><category>Email Security</category><category>Governance / Compliance</category><pubDate>Thu, 23 Apr 2026 03:59:21 GMT</pubDate></item><item><title>Microsoft Sentinel MCP Server with external AI models (Claude) for natural language investigations</title><link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/microsoft-sentinel-mcp-server-with-external-ai-models-claude-for/ba-p/4507013</link><guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/microsoft-sentinel-mcp-server-with-external-ai-models-claude-for/ba-p/4507013</guid><description>Security teams are increasingly exploring how AI assistants support them in investigating incidents, asking questions, and exploring their data. At the same time, controlling how data is accessed remains critical. Today, we’re sharing how Sentinel can support a third-party AI assistant like Claude...</description><dc:creator>mcasgrain</dc:creator><category>Microsoft Entra</category><category>Microsoft Sentinel</category><category>Identity Security</category><category>SIEM / XDR</category><category>Security Operations</category><pubDate>Wed, 22 Apr 2026 21:35:29 GMT</pubDate></item><item><title>From alert overload to decisive action: How Security Copilot agents are transforming security and IT</title><link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/from-alert-overload-to-decisive-action-how-security-copilot/ba-p/4504213</link><guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/from-alert-overload-to-decisive-action-how-security-copilot/ba-p/4504213</guid><description>Security and IT teams operate in a constant stream of alerts, incidents, and investigations. As environments expand across identities, endpoints, cloud, and data, the challenge becomes clear: identifying real risk quickly enough to act. Security Copilot agents bring AI directly into the flow of...</description><dc:creator>Lizzie_Heinze</dc:creator><category>Microsoft Entra</category><category>Microsoft Intune</category><category>Microsoft Purview</category><category>Microsoft Security Copilot</category><category>Microsoft Defender for Endpoint</category><category>Microsoft Sentinel</category><category>Identity Security</category><category>Endpoint Security</category><category>Threat Intelligence</category><category>AI Security</category><category>Governance / Compliance</category><category>SIEM / XDR</category><category>Security Operations</category><category>Email Security</category><category>Vulnerability Management</category><pubDate>Tue, 21 Apr 2026 22:55:44 GMT</pubDate></item><item><title>Automate cybersecurity at scale with Microsoft Security Copilot agents</title><link>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/automate-cybersecurity-at-scale-with-microsoft-security-copilot/ba-p/4394675</link><guid>https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/automate-cybersecurity-at-scale-with-microsoft-security-copilot/ba-p/4394675</guid><description>When we introduced Microsoft Security Copilot last year, we set out to transform the way defenders approach cybersecurity. As one of the industry's first generative AI solutions for security and IT teams, Security Copilot is empowering teams to catch what others miss, respond faster, and strengthen...</description><dc:creator>Dorothy_Li</dc:creator><category>Microsoft Intune</category><category>Microsoft Purview</category><category>Microsoft Security Copilot</category><category>Microsoft Entra</category><category>Security Operations</category><category>Governance / Compliance</category><category>Threat Intelligence</category><category>AI Security</category><category>Identity Security</category><category>Email Security</category><category>Endpoint Security</category><category>Vulnerability Management</category><pubDate>Tue, 21 Apr 2026 22:29:17 GMT</pubDate></item><item><title>Security Copilot for SOC: bringing agentic AI to every defender</title><link>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/security-copilot-for-soc-bringing-agentic-ai-to-every-defender/ba-p/4470187</link><guid>https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/security-copilot-for-soc-bringing-agentic-ai-to-every-defender/ba-p/4470187</guid><description>Cybersecurity has entered an era of relentless complexity. As threat actors increasingly leverage artificial intelligence to automate attacks, evade detection, and scale their tactics, defenders are challenged to keep up. In this new era, security operations centers (SOCs) must transform to not...</description><dc:creator>cristinadagamah</dc:creator><category>Microsoft Defender XDR</category><category>Microsoft Security Copilot</category><category>Microsoft Sentinel</category><category>Security Operations</category><category>SIEM / XDR</category><category>Threat Intelligence</category><category>AI Security</category><category>Email Security</category><category>Governance / Compliance</category><category>Identity Security</category><category>Incident Response</category><pubDate>Tue, 21 Apr 2026 19:32:47 GMT</pubDate></item><item><title>Accelerating Frontier Transformation with Microsoft partners</title><link>https://blogs.microsoft.com/blog/2026/04/21/accelerating-frontier-transformation-with-microsoft-partners/</link><guid>https://blogs.microsoft.com/blog/2026/04/21/accelerating-frontier-transformation-with-microsoft-partners/</guid><description>AI has moved quickly from experimentation to production. Customers want measurable business outcomes, along with security, governance and responsible AI built in from day one. Microsoft partners are a meaningful differentiator to deliver these objectives. They turn ideas into deployable solutions...</description><dc:creator>Nicole Dezen</dc:creator><category>General Security</category><category>General Security</category><pubDate>Tue, 21 Apr 2026 17:00:03 GMT</pubDate></item><item><title>Strengthening Identity Resilience: A Deep Dive into Microsoft Entra Backup and Recovery</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/strengthening-identity-resilience-a-deep-dive-into-microsoft/ba-p/4513401</link><guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/strengthening-identity-resilience-a-deep-dive-into-microsoft/ba-p/4513401</guid><description>In the modern security landscape, we often say that "Identity is the new perimeter." We spend significant resources on Conditional Access, Phishing-Resistant MFA, and Identity Protection to keep the "bad guys" out. But what happens when the threat is already inside, or when a legitimate...</description><dc:creator>Farooque</dc:creator><category>Microsoft Entra</category><category>Identity Security</category><category>Email Security</category><pubDate>Tue, 21 Apr 2026 14:49:07 GMT</pubDate></item><item><title>Running multimedia AI models on Container Apps with Serverless GPU (A100 &amp; T4)</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/running-multimedia-ai-models-on-container-apps-with-serverless/ba-p/4513063</link><guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/running-multimedia-ai-models-on-container-apps-with-serverless/ba-p/4513063</guid><description>A video format is available for watching. Prerequisites - An Azure account with sufficient permissions to create resources. - Terraform installed on your local machine. Infrastructure Provisioning Clone the Github repository and navigate to the project directory. Initialize Terraform and apply the...</description><dc:creator>HoussemDellai</dc:creator><category>General Security</category><category>Endpoint Security</category><category>Identity Security</category><pubDate>Mon, 20 Apr 2026 17:14:39 GMT</pubDate></item><item><title>What Changed in RC4 with the January 2026 Windows Update and Why it is Important</title><link>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/what-changed-in-rc4-with-the-january-2026-windows-update-and-why/ba-p/4504732</link><guid>https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/what-changed-in-rc4-with-the-january-2026-windows-update-and-why/ba-p/4504732</guid><description>In case you haven’t heard, RC4 is not secure and has been deprecated. In this article, I will discuss what changed with the January 2026 Windows Update and why it is important to start auditing and remediate RC4 usage is your environment. Starting with the January 13, 2026, Windows security...</description><dc:creator>Elanor92</dc:creator><category>General Security</category><category>Vulnerability Management</category><pubDate>Sun, 19 Apr 2026 14:11:51 GMT</pubDate></item></channel></rss>