Rabia Noureen profile picture

Follow Rabia

Rabia Noureen

News Editor

Rabia comes from a solid IT background and has been writing professionally about Microsoft products and other technology for four years. Rabia has also written for OnMSFT.com as well as Windows Report. She is always up to date on the latest trends in the IT Industry and has done extensive research in the data science industry.

LATEST

Teams hero approved 2

Microsoft Offers Concessions to EU Amid Teams Antitrust Probe

Microsoft has proposed a set of commitments to the European Commission aimed at resolving concerns over the bundling of Teams in its Microsoft 365 and Office 365 suites. These commitments are now open for public feedback as part of the Commission’s ongoing competition investigation. Slack’s 2020 complaint sparked regulatory action In 2020, Slack filed an…

View Article
Cloud Computing

Gartner Warns: 6 Cloud Trends That Could Make or Break Your Business by 2029

As cloud adoption accelerates, many organizations are discovering that the journey is filled with unexpected hurdles and frustrations. In response, Gartner has identified six key trends that will shape the future of cloud computing over the next four years. “These trends are accelerating the shift in how cloud transforms from a technology enabler to a…

View Article
Network Security

Microsoft Defender for Office 365 Automated Investigation and response (AIR) Now Blocks Threats Automatically

Microsoft has rolled out automated remediation support for its Automated Investigation and Response (AIR) in Defender for Office 365. This new security feature can now take AI-driven action against detected threats to eliminate the need for manual intervention from security teams. What is Automated Investigation and Response (AIR)? Automated Investigation and Response (AIR) is a…

View Article
Security

AppSec Just Got a New Boss — And It’s Not the Security Team!

Security is becoming a key factor in purchasing decisions, particularly across Europe, where it’s now seen as a competitive differentiator. At the same time, responsibility for security is shifting from centralized teams to developers and product groups, which reflects the growing influence of DevSecOps. According to the Checkmarx’ annual report, this survey was conducted based…

View Article
Cloud Computing

Microsoft Introduces File Attachment Support in Case Management to Streamline Threat Investigations

Microsoft has announced the public preview of file attachment support in Case Management, a new feature that lets administrators seamlessly upload and organize essential documents directly within a case. This enhancement streamlines investigations by keeping all relevant evidence in one secure, centralized location. Microsoft Defender Case Management is a built-in feature that allows security teams…

View Article
Windows update hero image

May 2025 Patch Tuesday Updates Fix 5 Zero-Day Vulnerabilities

Microsoft has rolled out the May 2025 Patch Tuesday updates, delivering not only the routine security fixes but also several notable quality enhancements for Windows 11 and Windows 10. This month’s release includes an impressive 74 patches addressing vulnerabilities across Windows and its components, Office, Azure, Remote Desktop Gateway Service, Microsoft Defender, and more. On…

View Article
Hero approved Microsoft 365

Microsoft 365 Apps to Receive Security Updates on Windows 10 Until 2028

Microsoft has announced it will continue supporting Microsoft 365 apps on Windows 10 through October 2028, offering users a longer transition period. The company detailed in a support document that Microsoft 365 subscribers will keep receiving security updates for these apps until October 10, 2028. After October 14, customers with an active Microsoft 365 subscription…

View Article
Cloud Computing

High Volume Email Service to Restrict Email Delivery to Internal Recipients Next Month

Microsoft has detailed some important updates for the High Volume Email (HVE) service that launched in public preview in July 2024. The company will extend support for basic authentication in HVE until September 2028, offering organizations more time to modernize their systems. Microsoft has removed basic authentication support for email connectivity protocols to enhance security…

View Article
Security

Majority of Businesses Unprepared for AI-Powered Cyberattacks, Cisco Warns

Cisco’s latest research reveals that most organizations are ill-equipped to handle today’s growing cyberthreats. According to the 2025 Cisco Cybersecurity Readiness Index, only 4 percent of organizations have achieved a “Mature” level of cybersecurity preparedness capable of withstanding modern cyberattacks. Cisco’s research study is based on a survey of 8,000 private sector security and business…

View Article
Cloud Computing and Security

Microsoft Defender Portal Adds Unified Security Summary to Simplify Cybersecurity Reporting

Microsoft has launched a unified security summary in its Defender portal, aimed at simplifying how administrators track and report security progress. This comprehensive report delivers actionable insights into an organization’s overall security posture, making it easier to communicate risks and achievements. “Security operations center (SOC) teams can easily showcase their security achievements and the impact…

View Article
Cloud Computing

Microsoft 365 Admin Center Adds EWS Usage Reports to Streamline Migration Planning

Microsoft has rolled out Exchange Web Services (EWS) usage reports in the Microsoft 365 Admin Center, giving administrators valuable insights into EWS activity across their organization. This new feature is aimed at helping IT teams monitor usage patterns and strategically reduce reliance on the soon-to-be-retired EWS platform. Exchange Web Services (EWS) is an API that…

View Article
warning-cyber-attack

Hackers Impersonate IT Helpdesks to Deploy Stealthy Ransomware in U.S. Firms

Cybersecurity researchers have discovered a surge in callback phishing attacks, where hackers are targeting legal, financial, and accounting firms across the U.S. The ultimate goal of these attacks is to steal sensitive data and extort millions in ransom from the victims. How does the callback phishing scam work? According to a new report by EclecticIQ…

View Article
Go to page