Microsoft FY23 Q1 Earnings

Continue reading


@microsoft.com | 1 year ago

Microsoft Earning Results Q3 2022

Continue reading


@microsoft.com | 1 year ago

Microsoft FarmVibes Democratizing digital tools for sustainable agriculture

Continue reading


@microsoft.com | 1 year ago

Why Microsoft 365 is teaming up with OREO THINS to give you a break

Breaks during the workday are essential to our well-being. That's why Microsoft 365 and OREO THINS are teaming up to create the THINVITE. | Continue reading


@microsoft.com | 1 year ago

Microsoft Adaptive Accessories

Shop accessible devices from Microsoft Store to customize your setup to your needs. Find accessibility products and adaptive tech accessories for Surface, Xbox, and more. | Continue reading


@microsoft.com | 1 year ago

Coq: The world’s best macro assembler? (2013)

We describe a Coq formalization of a subset of the x86 architecture. One emphasis of the model is brevity: using dependent types, type classes and notation we give the x86 semantics a makeover that counters its reputation for baroqueness. We model bits, bytes, and memory concrete … | Continue reading


@microsoft.com | 1 year ago

Microsoft Office is changing to Microsoft 365

The home for your favorite tools and content. Now with new ways to help you find, create, and share your content, all in one place. | Continue reading


@microsoft.com | 1 year ago

Surface Laptop 5

Multitask with Surface Laptop 5, a sleek and super lightweight, high-performance touchscreen laptop with a remarkable keyboard. Choose your size and vibrant color to make Surface Laptop 5 your own. | Continue reading


@microsoft.com | 1 year ago

Surface Pro 9

Surface Pro 9 gives you the tablet flexibility you want and the laptop performance, optional 5G connectivity, and long battery life you need. Create a full Windows 11 desktop setup with multiple monitors on its stunning, edge-to-edge 13” PixelSense™ touchscreen designed for pen. | Continue reading


@microsoft.com | 1 year ago

Zinc weaponizing open-source software

In recent months, Microsoft detected weaponization of legitimate open-source software by an actor the Microsoft Threat Intelligence Center (MSTIC) tracks as ZINC, targeting employees at media, defense and aerospace, and IT service provider organizations in the US, UK, India, and … | Continue reading


@microsoft.com | 1 year ago

Vulnerability in TikTok Android app could lead to one-click account hijacking

Microsoft discovered a high-severity vulnerability in the TikTok Android application, now identified as CVE-2022-28799 and fixed by TikTok, which could have allowed attackers to compromise users' accounts with a single click. | Continue reading


@microsoft.com | 1 year ago

Consistency-Based Service Level Agreements for Cloud Storage (2013)[pdf]

Continue reading


@microsoft.com | 1 year ago

Static TypeScript, a Static Compiler for the TypeScript Language [pdf]

Continue reading


@microsoft.com | 1 year ago

Disrupting SEABORGIUM's ongoing phishing operations

The Microsoft Threat Intelligence Center (MSTIC) has observed and taken actions to disrupt campaigns launched by SEABORGIUM in campaigns involve persistent phishing and credential theft campaigns leading to intrusions and data theft. | Continue reading


@microsoft.com | 1 year ago

Levity Polymorphism [pdf]

Continue reading


@microsoft.com | 1 year ago

Resin: Holistic Service for Dealing with Memory Leaks in Production Cloud Infra

Memory leak is a notorious issue. Despite the extensive efforts, addressing memory leaks in large production cloud systems remains challenging. Existing solutions incur high overhead and/or suffer from high inaccuracies. This paper presents RESIN, a solution designed to holistica … | Continue reading


@microsoft.com | 1 year ago

Microsoft new solutions for threat intelligence and attack surface management

Defenders are up against the most sophisticated threat landscape we’ve ever seen. Today, we’re proud to execute our threat intelligence vision behind that acquisition and announce several new solutions to help security teams get ahead of adversaries and catch what others miss. | Continue reading


@microsoft.com | 1 year ago

Pua: Win32/InstallCore

Continue reading


@microsoft.com | 1 year ago

A macOS App Sandbox escape vulnerability: A deep dive into CVE-2022-26706

Microsoft uncovered a vulnerability in macOS that could allow specially crafted codes to escape the App Sandbox and run unrestricted on the system. We shared these findings with Apple, and fix for this vulnerability, now identified as CVE-2022-26706, was included in the security … | Continue reading


@microsoft.com | 1 year ago

Attackers use AiTM phishing sites as entry point to further financial fraud

A large-scale phishing campaign that attempted to target over 10,000 organizations since September 2021 used adversary-in-the-middle (AiTM) phishing sites to steal passwords, hijack a user’s sign-in session, and skip the authentication process, even if the user had enabled multif … | Continue reading


@microsoft.com | 1 year ago

Reference Counting with Frame Limited Reuse

The recently introduced Perceus algorithm can automatically insert reference count instructions such that the resulting (cycle-free) program is garbage free: objects are freed at the very moment they can no longer be referenced. An important extension of Perceus is reuse analysis … | Continue reading


@microsoft.com | 1 year ago

AI4Science to empower the fifth paradigm of scientific discovery

Over the coming decade, deep learning looks set to have a transformational impact on the natural sciences. The consequences are potentially far-reaching and could dramatically improve our ability to model and predict natural phenomena over widely varying scales of space and time. … | Continue reading


@microsoft.com | 1 year ago

Hive ransomware gets upgrades in Rust

With its latest variant carrying several major upgrades, Hive proves it’s one of the fastest evolving ransomware payload, exemplifying the continuously changing ransomware ecosystem. | Continue reading


@microsoft.com | 1 year ago

Microsoft clarifies that game activity is shared with third parties in new ToS

Continue reading


@microsoft.com | 1 year ago

Toll fraud malware: How an Android application can drain your wallet

Toll fraud malware, a subcategory of billing fraud in which malicious applications subscribe users to premium services without their knowledge or consent, is one of the most prevalent types of Android malware – and it continues to evolve. | Continue reading


@microsoft.com | 1 year ago

Formally Proven Binary Format Parsers

With an eye toward performance, interoperability, or legacy concerns, low-level system software often must parse binary encoded data formats. Few tools are available for this task, especially since the formats involve a mixture of arithmetic and data dependence, beyond what can b … | Continue reading


@microsoft.com | 1 year ago

Microwriter: A portable, one-handed word processor with 6 button keypad (1978)

Continue reading


@microsoft.com | 1 year ago

Microsoft New Future of Work Report 2022 [pdf]

Continue reading


@microsoft.com | 1 year ago

Internet Explorer – End of Life

Continue reading


@microsoft.com | 1 year ago

Microsoft Teams uses AI and machine learning to improve calls and meetings

Disruptive echo effects, poor room acoustics, and choppy videos are some common issues that can detract from the effectiveness of online calls and meetings. Through AI and machine learning, which have become fundamental to our strategy for continual improvement, we’ve delivered i … | Continue reading


@microsoft.com | 1 year ago

Inspired by “The Book of Why” Microsoft open-sourced a library called DoWhy

Identifying causal effects is an integral part of scientific inquiry. It helps us understand everything from educational outcomes to the effects of social policies to risk factors for diseases. Questions of cause-and-effect are also critical for the design and data-driven evaluat … | Continue reading


@microsoft.com | 1 year ago

Microsoft introducing ways to detect people “leaving” the company and more

The Microsoft 365 Roadmap lists updates that are currently planned for applicable subscribers. Check here for more information on the status of new features and updates. | Continue reading


@microsoft.com | 1 year ago

The Microsoft TerraServer [pdf]

Continue reading


@microsoft.com | 1 year ago

Using Python to unearth a goldmine of threat intelligence from leaked chat logs

Dealing with a great amount of data can be time consuming, thus using Python can be very powerful to help analysts sort information and extract the most relevant data for their investigation. The open-source tools library, MSTICpy, for example, is a Python tool dedicated to threa … | Continue reading


@microsoft.com | 1 year ago

Microsoft Entra

Identity is not just about directories, and access is not just about the network. Security challenges have become much broader, so we need broader solutions. We need to secure access for every customer, partner, and employee—and for every microservice, sensor, network, device, an … | Continue reading


@microsoft.com | 1 year ago

The Dafny Programming Language

Dafny is a programming language with built-in specification constructs. The Dafny static program verifier can be used to verify the functional correctness of programs. The Dafny programming language is designed to support the static verification of programs. It is imperative, seq … | Continue reading


@microsoft.com | 1 year ago

Android apps with millions of downloads exposed to high-severity vulnerabilities

Microsoft uncovered high-severity vulnerabilities in a mobile framework used by multiple large mobile service providers in pre-installed Android System apps that potentially exposed users to remote or local attacks. | Continue reading


@microsoft.com | 1 year ago

(De)ToxiGen: Leveraging LLMs to build more robust hate speech detection tools

It’s a well-known challenge that large language models (LLMs)—growing in popularity thanks to their adaptability across a variety of applications—carry risks. Because they’re trained on large amounts of data from across the internet, they’re capable of generating inappropriate an … | Continue reading


@microsoft.com | 1 year ago

Microsoft Security Development Lifecycle (SDL)

Learn about the Microsoft Security Development Lifecycle (SDL) and how it can improve software development security. | Continue reading


@microsoft.com | 2 years ago

Decentralized and Collaborative AI on Blockchain (2019)

Machine learning has recently enabled large advances in artificial intelligence, but these tend to be highly centralized. The large datasets required are generally proprietary; predictions are often sold on a per-query basis; and published models can quickly become out of date wi … | Continue reading


@microsoft.com | 2 years ago

Microsoft Cloud Strength Fuels Third Quarter Results

Continue reading


@microsoft.com | 2 years ago

Ekya: Continuous Learning of Video Analytics Models on Edge Compute Servers' [pdf]

Continue reading


@microsoft.com | 2 years ago

The Rise of the Triple Peak Day

Traditionally, knowledge workers had two productivity peaks in their workday: before lunch and after lunch. During the pandemic, a third peak emerged. | Continue reading


@microsoft.com | 2 years ago

Jigsaw fixes bugs in machine-written software

Large pre-trained language models such as GPT-3, Codex, and others can be tuned to generate code from natural language specifications of programmer intent. Such automated models have the potential to improve productivity for every programmer in the world. But since the models can … | Continue reading


@microsoft.com | 2 years ago

Show HN: Free face recognition app to find people in videos an pics

Find people in images and videos | Continue reading


@microsoft.com | 2 years ago

Dev-0537 (LAPSUS$) criminal actor targeting organizations

The activity we have observed has been attributed to a threat group that Microsoft tracks as DEV-0537, also known as LAPSUS$. DEV-0537 is known for using a pure extortion and destruction model without deploying ransomware payloads. | Continue reading


@microsoft.com | 2 years ago

Making Hybrid Work Work

From when to go to the office to why work in the first place, employees have a new “worth it” equation. And there’s no going back. | Continue reading


@microsoft.com | 2 years ago

Great Expectations: Making Hybrid Work Work

From when to go to the office to why work in the first place, employees have a new “worth it” equation. And there’s no going back. | Continue reading


@microsoft.com | 2 years ago