Security News

D2iQ announced the availability of the D2iQ Kubernetes Platform, including D2iQ Kommander, D2iQ Konvoy, and D2iQ Kaptain, in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure. The D2iQ Kubernetes Platform provides customers with the technology, services, and support they need to be successful with Kubernetes in production.

Microsoft has flexed its muscles in the cybersecurity space, and will drop a reported $500 million in cash to acquire RiskIQ, a late stage startup in the threat intelligence and attack surface management business. Microsoft called out the value of RiskIQ's attack surface management capabilities as part of the impetus for the acquisition.

Microsoft will roll out a fix for a known issue causing Outlook for Microsoft 365 to crash on systems where users attempted using the Search bar or Search Suggestions features. As Microsoft describes the issue, "If you attempt to use the"Search" bar within Outlook, the application will shut down.

In addition to Windows 11, Microsoft has been secretly working on a new Windows PC experience called 'Cloud PC' that allows business customers to run virtualized desktops in the cloud. Cloud PC is reportedly based on Azure and uses Windows Virtual Desktop and remote desktop clients to stream a Windows desktop to any device.

Microsoft removed a registry hack in the latest preview build that allowed Windows 11 users to revert to the "Classic" Windows 10 Start Menu. When the Windows 11 preview build was leaked in June, one of the most significant and most controversial changes was a new floating Start Menu centered in the middle of the Taskbar.

Microsoft removed a registry hack in the latest preview build that allowed Windows 11 users to revert to the "Classic" Windows 10 Start Menu. When the Windows 11 preview build was leaked in June, one of the most significant and most controversial changes was a new floating Start Menu centered in the middle of the Taskbar.

Legacy users of Microsoft Excel are being targeted in a malware campaign that uses a novel malware-obfuscation technique to disable Office defenses and deliver the Zloader trojan. The attack, according to research published Thursday by McAfee, marries functions in Microsoft Office Word and Excel to work together to download the Zloader payload, without triggering an alert warning for end users of the malicious attack.

Just days after shipping an emergency Windows update to cover a dangerous code execution flaw in the Print Spooler service, Microsoft is investigating a new set of claims that its so-called 'PrintNightmare' patch has not properly fixed the underlying vulnerability. The company followed up with a blog post late Thursday insisting the emergency patch is "Working as designed" and "Effective against the known print spooling exploits."

Microsoft this week revealed that it paid out more than $13.6 million in bug bounties between July 1, 2020, and June 30, 2021. As part of the company's 17 bug bounty and grant programs, participating security researchers can earn awards as high as $250,000 - the highest rewards are for critical vulnerabilities in Hyper-V. More than 340 security researchers across 58 countries received payouts as part of Microsoft's bug bounty programs over the past year, with the largest single amount awarded by the company being $200,000, for a Hyper-V vulnerability.

Microsoft says the emergency security updates released at the start of the week correctly patch the PrintNightmare Print Spooler vulnerability for all supported Windows versions and urges users to start applying the updates as soon as possible. This clarified guidance comes after security researchers tagged the patches as incomplete after finding that the OOB security updates could be bypassed in specific scenarios.