The Microsoft Cloud vulnerability went undetected for a month.| The Verge
Deeper analysis of Storm-0558 techniques for obtaining unauthorized access to email data, tools, and unique infrastructure characteristics.| Microsoft Security Blog
SUMMARY| Cybersecurity and Infrastructure Security Agency CISA
Microsoft and others in the industry have called for transparency when it comes to cyber incidents so that we can learn and get better. As we’ve stated previously, we cannot ignore the exponential rise and frequency of sophisticated attacks. The growing challenges we face only reinforce our commitment to greater information sharing and industry partnership. ...| Microsoft On the Issues
Results of Major Technical Investigations for Storm-0558 Key Acquisition| msrc.microsoft.com