CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments
A high-severity Linux vulnerability, “Copy Fail” (CVE-2026-31431), enables root privilege escalation across cloud environments and Kubernetes workloads. With a working exploit already in the wild, organizations should act quickly to detect,...
Microsoft Agent 365, now generally available, expands capabilities and integrations
We’re announcing the general availability of Agent 365, plus previews of new capabilities to discover and manage shadow AI agents. Learn more.
What’s new, updated, or recently released in Microsoft Security
Stay ahead of emerging threats with Microsoft’s newest security innovations and updates, delivered through the In the Loop series.
Email threat landscape: Q1 2026 trends and insights
In early 2026, email threats increased with a rise in credential phishing, QR code phishing, and CAPTCHA-gated campaigns, highlighted by Microsoft’s disruption of the Tycoon2FA phishing platform which led to a 15% volume decrease and shifts...
8 best practices for CISOs conducting risk reviews
Read Microsoft expert tips for CISOs on embracing strong proactive security to mitigate increased exposure to security threats.
Simplifying AWS defense with Microsoft Sentinel UEBA
Learn how Microsoft Sentinel UEBA helps defenders distinguish benign AWS activity from attacker behavior by enriching raw CloudTrail logs with clear, binary behavioral signals derived from baseline user, peer, and device behavior patterns.
AI-powered defense for an AI-accelerated threat landscape
Read how Microsoft is partnering with Anthropic and broader industry to use leading models, paired with our platforms and expertise, to turn AI-driven discovery into protection at scale.
Detection strategies across cloud and identities against infiltrating IT workers
The shift to remote and hybrid work since the pandemic expanded global hiring and accelerated digital onboarding, increasing reliance on online identity verification and remote access.
Making opportunistic cyberattacks harder by design
How Microsoft secures Dynamics 365 and Power Platform by removing credentials, reducing attack surfaces, and using platform engineering to block opportunistic threats.
Cross‑tenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbook
Threat actors are abusing external Microsoft Teams collaboration to impersonate IT helpdesk staff and convince users to grant remote access. Once inside, attackers can abuse legitimate tools and standard admin protocols to move laterally an...
What's New
Top 5 Across All Sources-
CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments
Microsoft Security Blog · 2d ago -
Microsoft Agent 365, now generally available, expands capabilities and integrations
Microsoft Security Blog · 2d ago -
What’s new, updated, or recently released in Microsoft Security
Microsoft Security Blog · 3d ago -
Email threat landscape: Q1 2026 trends and insights
Microsoft Security Blog · 3d ago -
8 best practices for CISOs conducting risk reviews
Microsoft Security Blog · 4d ago
Latest
Microsoft Security BlogCVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environmentsMicrosoft Security BlogMicrosoft Agent 365, now generally available, expands capabilities and integrationsMicrosoft Security BlogWhat’s new, updated, or recently released in Microsoft SecurityMicrosoft Security BlogEmail threat landscape: Q1 2026 trends and insightsMicrosoft Security Blog8 best practices for CISOs conducting risk reviewsMicrosoft Security BlogSimplifying AWS defense with Microsoft Sentinel UEBAMicrosoft 365 BlogCopilot’s agentic capabilities in Word, Excel, and PowerPoint are generally availableMicrosoft Security BlogAI-powered defense for an AI-accelerated threat landscapeMicrosoft Security BlogDetection strategies across cloud and identities against infiltrating IT workersHeimdal Security BlogHeimdal Expands AI Strategy with AI Wingman and Third-Party AI ContainmentMicrosoft Security BlogMaking opportunistic cyberattacks harder by designMicrosoft Security BlogCross‑tenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbookMicrosoft 365 BlogBring your everyday business apps into the flow of work with agents in Microsoft 365 CopilotMicrosoft 365 BlogNew and improved: Multi-agent orchestration, connected experiences, and faster prompt iterationSecurity | Microsoft Azure Blog | Microsoft AzureAzure IaaS: Keep critical applications running with built-in resiliency at scaleMicrosoft 365 BlogCopilot Cowork: Now available in FrontierHeimdal Security BlogYou Only Know What You’ve Got When Its GoneHeimdal Security BlogNordic MSPs Can Now Access Heimdal’s Unified Security and Compliance Platform Through ElovadeMicrosoft 365 BlogCopilot Cowork: A new way of getting work doneMicrosoft 365 BlogPowering Frontier Transformation with Copilot and agentsMicrosoft Security BlogCVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environmentsMicrosoft Security BlogMicrosoft Agent 365, now generally available, expands capabilities and integrationsMicrosoft Security BlogWhat’s new, updated, or recently released in Microsoft SecurityMicrosoft Security BlogEmail threat landscape: Q1 2026 trends and insightsMicrosoft Security Blog8 best practices for CISOs conducting risk reviewsMicrosoft Security BlogSimplifying AWS defense with Microsoft Sentinel UEBAMicrosoft 365 BlogCopilot’s agentic capabilities in Word, Excel, and PowerPoint are generally availableMicrosoft Security BlogAI-powered defense for an AI-accelerated threat landscapeMicrosoft Security BlogDetection strategies across cloud and identities against infiltrating IT workersHeimdal Security BlogHeimdal Expands AI Strategy with AI Wingman and Third-Party AI ContainmentMicrosoft Security BlogMaking opportunistic cyberattacks harder by designMicrosoft Security BlogCross‑tenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbookMicrosoft 365 BlogBring your everyday business apps into the flow of work with agents in Microsoft 365 CopilotMicrosoft 365 BlogNew and improved: Multi-agent orchestration, connected experiences, and faster prompt iterationSecurity | Microsoft Azure Blog | Microsoft AzureAzure IaaS: Keep critical applications running with built-in resiliency at scaleMicrosoft 365 BlogCopilot Cowork: Now available in FrontierHeimdal Security BlogYou Only Know What You’ve Got When Its GoneHeimdal Security BlogNordic MSPs Can Now Access Heimdal’s Unified Security and Compliance Platform Through ElovadeMicrosoft 365 BlogCopilot Cowork: A new way of getting work doneMicrosoft 365 BlogPowering Frontier Transformation with Copilot and agents
By Source
Feeds organized so you can skim by site.
Density
Sort
Copilot’s agentic capabilities in Word, Excel, and PowerPoint are generally available
Copilot's newest features are now generally available as the default experience across all Microsoft 365 subscriptions.
Bring your everyday business apps into the flow of work with agents in Microsoft 365 Copilot
Discover how apps integrate with AI agents to power Copilot experiences, streamline workflows, and turn business context into action.
New and improved: Multi-agent orchestration, connected experiences, and faster prompt iteration
Explore what's new in Copilot Studio: Multi-agent systems now generally available, plus updates to the Prompt Editor and governance controls.
Copilot Cowork: Now available in Frontier
Today, Copilot Cowork—designed for long-running, multi-step work in Microsoft 365—is available via the Frontier program.
Copilot Cowork: A new way of getting work done
Copilot Cowork turns intent into action across Microsoft 365—automating tasks, coordinating workflows, and keeping you in control. See how.
Powering Frontier Transformation with Copilot and agents
Wave 3 of Microsoft 365 Copilot introduces Copilot Cowork, multi‑model intelligence, and enterprise‑ready AI—built to get real work done.
SharePoint at 25: How Microsoft is putting knowledge to work in the AI era
Discover how SharePoint’s 25‑year legacy powers Microsoft 365 Copilot, Work IQ, and AI‑driven knowledge for organizations worldwide.
Microsoft Sovereign Cloud adds governance, productivity, and support for large AI models securely running even when completely disconnected
The ultimate Microsoft 365 community event returns—your front‑row seat to the future of intelligent work
Join the ultimate Microsoft 365 community event with fresh insights, AI innovations, and a front‑row look at the future of intelligent work.
6 core capabilities to scale agent adoption in 2026
Learn six capabilities to support agent adoption at scale in 2026 with Microsoft Copilot Studio, from governance and security to operations.
Heimdal Expands AI Strategy with AI Wingman and Third-Party AI Containment
Heimdal today unveiled the next phase of its AI strategy, expanding AI Wingman with three new layers - Assist, Triage and SOC - alongside the introduction of Third-Party AI Containment.
You Only Know What You’ve Got When Its Gone
Prepare for the expected. Rehearse an action plan in case of technology failure or cyberattacks. We all know they can happen.
Nordic MSPs Can Now Access Heimdal’s Unified Security and Compliance Platform Through Elovade
Heimdal has appointed Elovade as its official distributor in the Nordic region. The move gives MSPs and resellers across Sweden, Norway, Denmark, Iceland, and Finland direct access to Heimdal's consolidated cybersecurity platform through a ...
OpenClaw Incidents Show Why AI Adoption Pressure Puts Companies at Risk
The OpenClaw security failures show how hasty AI adoption can expose businesses and supply chains to major cyber risk.
Heimdal Claims Industry First With a Cyber Essentials Control Mapping for PEDM to Help Organisations Prove Least Privilege
Heimdal is the first vendor to publish a dedicated Cyber Essentials control mapping for PEDM, setting out how privilege management supports Cyber Essentials requirements and what evidence can be produced to support assessment and assurance.
Five Predictions for Cyber Security Trends in 2026
Morten Kjaersgaard, Heimdal’s Founder, and Adam Pilton, a former cybercrime investigator, predict five cyber security trends for 2026.
Heimdal Achieves OPSWAT Gold Certification for Anti-Malware
Heimdal today announced that its Next-Gen Antivirus (NGAV) with Extended Threat Protection (XTP) has achieved OPSWAT Gold Certification for Anti-Malware, validating its compatibility and effectiveness within OPSWAT’s industry-leading Access...
How to Avoid Holiday Shopping Scams (From a Former Cyber Detective)
Worried about holiday scams? Ex-cybercrime detective Adam Pilton breaks down the biggest threats and how to shop safely this festive season.
ITDR Best Practices: How to Detect, Prevent, and Contain Critical Identity Threats
Key takeaways: ITDR solutions monitor identity-based threats that traditional security tools miss, like hackers logging in with stolen credentials Effective ITDR requires integration with privileged access management and automated responses...
When Buyers Discount MSPs With One Big Customer
Your biggest customer loves you. Three years together. They trust you, pay on time, and refer others. From where you sit, that’s loyalty. From where a buyer sits, that’s a $$$ discount on your exit. This perception gap kills more MSP deals ...
15 loaded
Azure IaaS: Keep critical applications running with built-in resiliency at scale
Learn how Azure IaaS helps organizations start from a resilient platform foundation with availability, continuity, and recovery capabilities.
Azure IaaS: Explore new resources for building a stronger, more efficient infrastructure
Learn how Azure IaaS helps you modernize infrastructure, improve performance and resilience, optimize costs, and prepare for AI workloads. Read more.
Azure reliability, resiliency, and recoverability: Build continuity by design
Learn how Azure reliability, resiliency, and recovery capabilities work together to improve cloud continuity. Read more.
Microsoft strengthens sovereign cloud capabilities with new services
Discover new Microsoft digital sovereignty capabilities and upcoming features across AI, security, and productivity, to address sovereign cloud needs.
Enhancing software supply chain security with Microsoft’s Signing Transparency
Microsoft Signing Transparency delivers verifiable code integrity and tamper-evident software releases for stronger supply chain security.
Oracle Database@Azure offers new features, regions, and programs to unlock data and AI innovation
Migrate Oracle solutions to the cloud with a trusted, enterprise-ready platform from Microsoft and Oracle. Learn more.
Building secure, scalable AI in the cloud with Microsoft Azure
Forrester Research shows how Azure helps enterprises scale generative AI securely, unlocking real business value. Learn more.
Enhance AI security with Azure Prompt Shields and Azure AI Content Safety
Learn how Prompt Shields and Azure AI Content Safety can help guard against direct and indirect threats to your LLM-based solution.
Navigating the 2024 holiday season: Insights into Azure’s DDoS defense
Learn more on how Azure DDoS is keeping you prepared for this years trends in advanced attack tactics to keep your data secure.
6 insights to make your data AI-ready, with Accenture’s Teresa Tung
Learn more about the changing nature of data and its value to an AI strategy with Teresa Tung.
No matching sources found.