Microsoft is taking the first concrete step in its phased enforcement of the dedicated Exchange hybrid app requirement: on September 16, 2025 at 07:00 UTC Microsoft will temporarily block Exchange Web Services (EWS) traffic that uses the Exchange Online shared service principal for hybrid...
Microsoft has pushed a significant upgrade to Microsoft Sentinel’s User and Entity Behavior Analytics (UEBA), embedding AI-driven behavioral detection, broader cross‑cloud data ingestion, and dynamic baselining that together aim to surface subtle account compromise and insider risk while...
Microsoft’s Exchange team published a short but important Hotfix Update (HU) rollup for September 2025 that is aimed at fixing a non‑security issue in earlier updates and, crucially, preserves support for the dedicated Exchange hybrid application workflow introduced earlier in 2025 — the update...
august 2025
cisa
cu14
cu15
cve-2025-53786
entra id
ews
exchange hybrid
exchange server
exchange server 2016 cu23
graph permissions
health check
hotfix update
hybrid apps
hybrid configuration wizard
se rtm
serviceprincipal
windows update
Microsoft has confirmed that Phase 2 of its mandatory multi‑factor authentication (MFA) enforcement for Azure will begin a tenant‑by‑tenant rollout this autumn, extending MFA requirements from portal sign‑ins down into the Azure Resource Manager (ARM) control plane and affecting command‑line...
Microsoft has confirmed a second phase of mandatory multifactor authentication (MFA) that extends enforcement from Azure’s web admin consoles into the Azure Resource Manager (ARM) control plane — covering Azure CLI, Azure PowerShell, REST management APIs, mobile clients and...
Note: I tried to open the MSRC link you gave . I could not find any published advisory or public record for CVE‑2025‑55244 on Microsoft’s Update Guide or the major CVE/NVD indexes. Instead, Microsoft’s published Azure Bot Framework / Azure Bot Service elevation‑of‑privilege advisories are...
Microsoft revealed a compact but meaningful set of Cost Management updates for July and August 2025 that aim to reduce friction for partners, trim logging costs, simplify multi-cloud migrations, and strengthen the programmatic access story for Enterprise Agreement (EA) indirect partners—changes...
A publicly exposed appsettings.json file that contained Azure Active Directory application credentials has created a direct, programmatic attack path into affected tenants — a misconfiguration that can let attackers exchange leaked ClientId/ClientSecret pairs for OAuth 2.0 access tokens and then...
Two parallel announcements from Meta and Microsoft this week — a patched zero-click vulnerability in WhatsApp and a timetable for mandatory multi-factor authentication across Azure — crystallise a single lesson for enterprise security teams: convenience is no longer an acceptable substitute for...
Microsoft has announced that mandatory multi‑factor authentication will soon extend beyond Azure's web consoles to command‑line and programmatic interfaces, forcing a major rethink of developer tooling and automation strategies: starting this enforcement window, any user performing create...
Microsoft has begun a strict, time‑boxed push to move Exchange hybrid customers off a Microsoft‑managed shared service principal and onto a dedicated Exchange hybrid app in Entra ID — a change driven by a high‑severity hybrid vulnerability and enforced through short, scheduled EWS traffic blocks...
Microsoft’s Exchange team has given hybrid administrators a clear-but-urgent migration mandate: switch to the dedicated Exchange hybrid app and update on‑prem servers now, or face temporary disruptions in September and October followed by a permanent enforcement that will stop rich coexistence...
Microsoft Security Response Center (MSRC) now lists CVE-2025-53763 as an improper access control vulnerability in Azure Databricks that can be exploited to achieve elevation of privilege over the network, a finding that demands urgent attention from cloud and data platform administrators...
Microsoft’s August Patchday reads like a wake‑up call: a newly disclosed Kerberos-related weakness tied to the delegated Managed Service Account (dMSA) feature in Windows Server 2025 can — under the right conditions — let an attacker escalate to domain‑admin control, and a clutch of additional...
Microsoft's August security rollup is one of those months that makes system administrators stop what they're doing and triage: this Patch Tuesday delivered fixes for a broad sweep of vulnerabilities across Windows, Exchange, Azure and related services — including a publicly disclosed Kerberos...
A Microsoft Security Update Guide entry for CVE-2025-33051 describes an information disclosure vulnerability affecting Microsoft Exchange Server, and the appearance of that CVE on the vendor’s advisory should put any on‑premises Exchange administrator on high alert. At the time of writing...
A new wave of cybersecurity urgency is sweeping through IT departments as the Cybersecurity and Infrastructure Security Agency (CISA) issues a fresh, high-severity warning concerning Microsoft Exchange Server. The alert, centered around CVE-2025-53786, underscores a newly disclosed vulnerability...
Identity research published in July surfaces two sobering truths for Windows shops: attackers can now bypass dMSA authentication in Windows Server 2025 to mass‑generate service account passwords for lateral movement, and misgoverned first‑party apps in Microsoft Entra ID can be abused to...
A new high-severity security vulnerability is causing alarm among businesses that utilize hybrid Microsoft Exchange deployments, as both Microsoft and the US Cybersecurity and Infrastructure Security Agency (CISA) issue urgent advisories. This flaw—affecting Exchange Server 2016, 2019, and the...
A critical security vulnerability, identified as CVE-2025-53786, has been discovered in hybrid deployments of Microsoft Exchange Server. This flaw allows attackers with local administrative access to escalate their privileges within connected cloud environments, posing significant risks to...