Midcontinent Independent System Operator (MISO) has announced a strategic collaboration with Microsoft to build a cloud‑native, AI‑enabled unified data platform intended to accelerate transmission planning, improve real‑time situational awareness, and help the Midwest grid absorb surging...
agent governance
ai commerce
ai governance
cloud analytics
copilot studio
cybersecurity
enterprise ai
grid modernization
group policy
merchandising governance
model context protocol
oauth
operational ai
real-time data
retail feed
saas security
tampering
windows defender
windows security
workforce edge
On 29 October 2025 John Donovan published what he says is the unredacted transcript of a conversation with Microsoft Copilot about Royal Dutch Shell’s ethics — a public moment that crystallises three decades of rancour, a vast online archive of leaked documents, and an argument over how far...
Microsoft’s Copilot Studio can be weaponized to steal OAuth tokens — an attack chain Datadog Security Labs has dubbed “CoPhish” — by hosting malicious agents on Microsoft domains and using the agents’ built‑in sign‑in workflows to deliver convincing OAuth consent prompts that exfiltrate tokens...
Microsoft’s release of a Windows SDK for Facebook — a native, open-source library that brings full Facebook login, Graph API access, feeds, photo uploads and Like functionality into Universal Windows apps — marks a deliberate push to make Windows a more attractive, social-first platform for...
app engagement
cross-device
facebook
github
graph api
hololens
nuget
oauth
open source
sdk
sdk maintenance
social login
universal windows platform
uwp
windows
windows 10
windows phone
windows sdk for facebook
xbox
A growing number of Microsoft account holders report successful sign‑ins from IP addresses inside Microsoft’s own network despite having two‑factor authentication enabled — an uptick of incidents first detailed in a German investigation and corroborated by threads on Reddit and Microsoft’s own...
A new, industrialized phishing service called VoidProxy is being used by multiple criminal groups to intercept Google and Microsoft sign-ins in real time, harvest credentials, MFA responses and — critically — session cookies that let attackers impersonate users without needing passwords or...
A publicly exposed appsettings.json file that contained Azure Active Directory application credentials has created a direct, programmatic attack path into affected tenants — a misconfiguration that can let attackers exchange leaked ClientId/ClientSecret pairs for OAuth 2.0 access tokens and then...
If you still have Windows Live Mail installed on a PC running Windows 11, signing in and keeping the client working reliably requires more than just entering your email and password — it demands a clear understanding of how modern email authentication, server settings, and legacy software...
app password
email client
email export
eml
imap
migration
modern authentication
multi-factor authentication
oauth
outlook
pop
server configuration
smtp
thunderbird
tls
windows 11
windows live mail
windows mail
Microsoft’s Exchange team has taken a decisive step toward finally letting organizations retire the last Exchange server in hybrid environments by adding cloud-managed remote mailbox support — a per-mailbox “flip-the-switch” that transfers Exchange attribute authority to Exchange Online while...
Microsoft’s Exchange team has given hybrid administrators a clear-but-urgent migration mandate: switch to the dedicated Exchange hybrid app and update on‑prem servers now, or face temporary disruptions in September and October followed by a permanent enforcement that will stop rich coexistence...
admin consent
april 2025 hotfix
azure ad
cisa
cisa-ed-25-02
cve-2025-53786
entra id
ews
ews block
exchange hybrid
graph api
hcw
hybrid apps
hybrid coexistence
hybrid deployment
hybrid migration
it governance
keycredentials
microsoft 365
microsoft education
oauth
on-prem to online
phased enforcement
security
security audits
security hardening
service principal
setting override
Microsoft has made the Model Context Protocol (MCP) a first‑class citizen in Visual Studio, shipping general availability support that lets Copilot Chat and other agentic features connect to local or remote MCP servers via a simple .mcp.json configuration — a major convenience for developers...
copilot
defense in depth
enterprise security
github mcp server
mcp
mcp.json
model context protocol
oauth
one-click install
pat
prompt injection
read-only mode
remote server
security governance
tool poisoning
visual studio
OpenAI’s ChatGPT can now reach into your Gmail inbox, read your Google Calendar, and look up people in Google Contacts — all from inside a single chat — marking a clear escalation in the product’s push from a conversational assistant toward a full-fledged, context-aware workspace tool. The...
A rapidly escalating security threat has emerged for organizations relying on Microsoft 365, as hackers have devised sophisticated phishing campaigns that can bypass even two-factor authentication (2FA) protections. Since the beginning of 2025, attackers have compromised nearly 3,000 accounts...
The evolution of phishing campaigns in the cloud era has introduced a new breed of attacks that are increasingly hard to spot, even for seasoned security professionals. Among these, a recent campaign targeting Microsoft 365 logins stands out for its cunning use of Microsoft OAuth applications...
Phishing campaigns continue to evolve, adapting to security systems and adopting new tactics to dupe even vigilant users. Recent findings have uncovered a sophisticated Microsoft MFA phishing scheme that leverages the OAuth authorization framework—specifically, Microsoft OAuth applications—to...
Threat actors in 2025 have harnessed a new caliber of cyberattack, subverting enterprise identity and trust by weaponizing Microsoft OAuth applications to bypass even the most robust multi-factor authentication (MFA) defenses. This emerging campaign, tracked by Proofpoint and other leading...
Phishing campaigns have always shaped themselves around the contours of new technology, but the latest surge targeting Microsoft OAuth applications marks a seismic shift in both attacker strategy and the effectiveness of their exploits. In 2025, security researchers uncovered a wave of hybrid...
Phishing campaigns have always evolved in tandem with advances in enterprise security, but the latest wave targeting Microsoft OAuth applications represents a stunning leap in both sophistication and effectiveness. This ongoing campaign, first identified in early 2025, exemplifies a new breed of...
Sophisticated cyber adversaries have shifted tactics in recent months, exploiting fake Microsoft OAuth applications in tandem with advanced phishing toolkits such as Tycoon and ODx to compromise Microsoft 365 accounts worldwide. These attacks, tracked by researchers and security vendors...
Organizations of every size have come to rely on Microsoft 365 as the digital nervous system powering their communication, collaboration, and data management. With its robust ecosystem—spanning Exchange Online, SharePoint, Teams, and the evolving Entra ID (Azure AD)—Microsoft 365 has brought...