Microsoft resumed digital services for Nayara Energy following EU sanctions-related disruption, after the company moved court over an abrupt suspension without notice
Microsoft has resumed services to Nayara Energy after a brief suspension linked to EU sanctions; the company had scaled down refinery operations and moved court seeking service restoration
Delhi High Court agrees to hear Nayara Energy's plea against Microsoft over the suspension of essential services; seeks interim injunction for service restoration to maintain digital operations
Reportedly, Microsoft has disclosed a macOS flaw dubbed 'Sploitlight' that could have let attackers access highly sensitive data cached by Apple Intelligence. Apple has patched it with Sequoia 15.4
Microsoft Edge's new Copilot Mode brings AI-powered tools into the browser, enabling users to search, summarise, and complete tasks with optional voice input
Nayara seeks interim relief in Delhi High Court, says Microsoft suspended services citing EU sanctions despite no legal basis under Indian or US law
Nayara Energy has filed a case against Microsoft in Delhi High Court over the sudden suspension of licensed services, including email and Teams, following EU sanctions on its Russian-linked ownership
To offset the impact of its AI data centres, Microsoft is investing in a method which involves buying human and farm waste and piping it thousands of feet underground through a pump
Hackers have breached about 400 government agencies, corporations and other groups, according to estimates from Eye Security
Microsoft Surface Laptop 5G features Intel Core Ultra Series 2 chips, AI-ready NPU, dynamic six-antenna 5G system, and SIM support. Available in August in the US, priced from $1,799.99
Windows 11 gets a functional upgrade with AI-driven features like Copilot Vision, Settings agent, improved Click to Do, and new tools in Paint, Photos, and Snipping Tool
Battered by its role in several major hacks, the software giant in late 2023 vowed to overhaul its cybersecurity, in a project called the Secure Future Initiative
While Microsoft has patched its software in recent days, cybersecurity researchers have already detected breaches on more than 100 servers representing 60 victims thus far
Microsoft has updated the Xbox PC app with features to track recent play history and surface all cloud-compatible games in one place for easier access
Hackers are using a serious flaw in SharePoint to attack companies and government servers; Microsoft has released an urgent fix and asked users to update their systems quickly
Microsoft said that attackers are specifically targeting clients running SharePoint servers from their own on-premise networks, as opposed to being hosted and managed by the tech firm
Microsoft has issued an emergency fix to close off a vulnerability in Microsoft's widely-used SharePoint software that hackers have exploited to carry out widespread attacks on businesses and at least some US government agencies. The company issued an alert to customers Saturday saying it was aware of the zero-day exploit being used to conduct attacks and that it was working to patch the issue. Microsoft updated its guidance Sunday with instructions to fix the problem for SharePoint Server 2019 and SharePoint Server Subscription Edition. Engineers were still working on a fix for the older SharePoint Server 2016 software. Anybody who's got a hosted SharePoint server has got a problem, said Adam Meyers, senior vice president with CrowdStrike, a cybersecurity firm. It's a significant vulnerability. Companies and government agencies around the world use SharePoint for internal document management, data organization and collaboration. What is a zero-day exploit? A zero-day exploit is
Microsoft said on Sunday it issued a security update for SharePoint Subscription Edition, which it said customers should apply immediately
Microsoft, which has its largest quantum lab in Denmark, will provide software and Atom Computing will build the quantum computer
A new CERT-In advisory warns of critical flaws in Microsoft software that could let attackers steal data, run malicious code, or bypass system protections