{
	"id": "601735b8-7d9b-404b-863f-fff8f39c1bab",
	"created_at": "2026-04-06T01:29:11.090863Z",
	"updated_at": "2026-04-10T03:25:23.124201Z",
	"deleted_at": null,
	"sha1_hash": "d4c3758e239a17ee20eb19bde0a4cde639b43d3e",
	"title": "Cloud security Insights | Microsoft Security Blog",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 248173,
	"plain_text": "Cloud security Insights | Microsoft Security Blog\r\nPublished: 2026-03-12 · Archived: 2026-04-06 00:37:21 UTC\r\nLearn more about the solutions, procedures, policies, and controls that help you protect your cloud-based systems\r\nand data.\r\nFiltered by\r\nClear All\r\nCloud security\r\nRefine results\r\nFrom transparency to action: What the latest Microsoft email security benchmark reveals\r\nhttps://www.microsoft.com/security/blog/2016/06/01/hacking-team-breach-a-cyber-jurassic-park/\r\nPage 1 of 3\n\nThe latest Microsoft benchmarking data reveals how Microsoft Defender mitigates modern email threats\r\ncompared to SEG and ICES vendors.\r\nShai-Hulud 2.0: Guidance for detecting, investigating, and defending against the supply\r\nchain attack\r\nThe Shai‑Hulud 2.0 supply chain attack represents one of the most significant cloud-native ecosystem\r\ncompromises observed recently.\r\nNew IDC research highlights a major cloud security shift\r\nNew IDC research shows why CISOs must move toward AI-powered, integrated platforms like CNAPP,\r\nXDR, and SIEM to reduce risk, cut complexity, and strengthen resilience.\r\nThe 5 generative AI security threats you need to know about detailed in new e-book\r\nIn this blog post, we’ll highlight the key themes covered in the e-book, including the challenges\r\norganizations face, the top generative AI threats to organizations, and how companies can enhance their\r\nsecurity posture to meet the dangers of today’s unpredictable AI environments.\r\nInside the attack chain: Threat activity targeting Azure Blob Storage\r\nAzure Blob Storage is a high-value target for threat actors due to its critical role in storing and managing\r\nmassive amounts of unstructured data at scale across diverse workloads and is increasingly targeted\r\nthrough sophisticated attack chains that exploit misconfigurations, exposed credentials, and evolving cloud\r\ntactics.\r\nMicrosoft Defender for Cloud remediated threats 30% faster than other solutions,\r\naccording to Forrester TEI study\r\nForrester found that Microsoft Defender for Cloud markedly enhanced the security, compliance, and\r\noperational efficiency of each company participating.\r\n6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security\r\nstrategy\r\nDiscover the top multicloud security risks across DevOps, runtime environments, identity and access, and\r\ndata in this new report from Microsoft.\r\n5 ways a CNAPP can strengthen your multicloud security environment\r\nCNAPP, or cloud-native application protection platform, can be a powerful tool in your cybersecurity\r\ntoolkit.\r\nAttackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters\r\nhttps://www.microsoft.com/security/blog/2016/06/01/hacking-team-breach-a-cyber-jurassic-park/\r\nPage 2 of 3\n\nMicrosoft recently uncovered an attack that exploits new critical vulnerabilities in OpenMetadata to gain\r\naccess to Kubernetes workloads and leverage them for cryptomining activity.\r\nSecure SaaS applications with Valence Security and Microsoft Security\r\nThe rapid adoption of Software as a Service (SaaS) has revolutionized collaboration and innovation across\r\nindustries.\r\nHow Strata Identity and Microsoft Entra ID solve identity challenges in mergers and\r\nacquisitions\r\nAlong with every merger and acquisition between two companies comes the need to combine and\r\nstrengthen their IT infrastructure.\r\nStarting your journey to become quantum-safe\r\nThanks to our extensive experience in quantum engineering and expertise as a service and security\r\nprovider, we can serve as a trusted partner to navigate this process across industry and government.\r\nSource: https://www.microsoft.com/security/blog/2016/06/01/hacking-team-breach-a-cyber-jurassic-park/\r\nhttps://www.microsoft.com/security/blog/2016/06/01/hacking-team-breach-a-cyber-jurassic-park/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.microsoft.com/security/blog/2016/06/01/hacking-team-breach-a-cyber-jurassic-park/"
	],
	"report_names": [
		"hacking-team-breach-a-cyber-jurassic-park"
	],
	"threat_actors": [
		{
			"id": "a3687241-9876-477b-aa13-a7c368ffda58",
			"created_at": "2022-10-25T16:07:24.496902Z",
			"updated_at": "2026-04-10T02:00:05.010744Z",
			"deleted_at": null,
			"main_name": "Hacking Team",
			"aliases": [],
			"source_name": "ETDA:Hacking Team",
			"tools": [],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "aa73cd6a-868c-4ae4-a5b2-7cb2c5ad1e9d",
			"created_at": "2022-10-25T16:07:24.139848Z",
			"updated_at": "2026-04-10T02:00:04.878798Z",
			"deleted_at": null,
			"main_name": "Safe",
			"aliases": [],
			"source_name": "ETDA:Safe",
			"tools": [
				"DebugView",
				"LZ77",
				"OpenDoc",
				"SafeDisk",
				"TypeConfig",
				"UPXShell",
				"UsbDoc",
				"UsbExe"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "e90c06e4-e3e0-4f46-a3b5-17b84b31da62",
			"created_at": "2023-01-06T13:46:39.018236Z",
			"updated_at": "2026-04-10T02:00:03.183123Z",
			"deleted_at": null,
			"main_name": "Hacking Team",
			"aliases": [],
			"source_name": "MISPGALAXY:Hacking Team",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775438951,
	"ts_updated_at": 1775791523,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/d4c3758e239a17ee20eb19bde0a4cde639b43d3e.pdf",
		"text": "https://archive.orkl.eu/d4c3758e239a17ee20eb19bde0a4cde639b43d3e.txt",
		"img": "https://archive.orkl.eu/d4c3758e239a17ee20eb19bde0a4cde639b43d3e.jpg"
	}
}