The new Microsoft Planner: What’s New and What’s Coming Next

 
Join the Microsoft Planner product team on Tuesday, September 17 at 9:00 AM Pacific to learn about recent updates to the Planner app, and get a sneak peek at what’s coming next, followed by a live Ask Microsoft Anything. Our product expert… Continue reading The new Microsoft Planner: What’s New and What’s Coming Next

Save ingestion costs by splitting logs into multiple tables and opting for the basic tier!

In this blog post I am going to talk about splitting logs to multiple tables and opting for basic tier to save cost in Microsoft Sentinel. Before we delve into the details, let’s try to understand what problem we are going to solve with this approach.
Continue reading Save ingestion costs by splitting logs into multiple tables and opting for the basic tier!

Protect and Detect: Microsoft Defender for Identity Expands to Entra Connect Server

We are excited to announce a new Microsoft Defender for Identity sensor for Entra Connect servers. This addition is a significant step in our ongoing commitment to expanding Defender for Identity’s coverage across hybrid identity environments. It reinf… Continue reading Protect and Detect: Microsoft Defender for Identity Expands to Entra Connect Server

Research Focus: Week of August 26, 2024

Learn what’s next for AI at Research Forum on Sept. 3;  WizardArena simulates human-annotated chatbot games; MInference speeds pre-filling for long-context LLMs via dynamic sparse attention; Reef: Fast succinct non-interactive zero-knowledge regex proofs.

The post Research Focus: Week of August 26, 2024 appeared first on Microsoft Research.

Continue reading Research Focus: Week of August 26, 2024

Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which we named Tickler. Tickler has been used in attacks against targets in the satellite, communications equipment, oil and gas, as well as federal and state government sectors in the United States and the United Arab […]

The post Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations appeared first on Microsoft Security Blog.

Continue reading Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations