Hackers and Microsoft seem to disagree on key details of the hack.
Category: Microsoft
Microsoft Related
Monitoring systems were looking for attacks using technique popularized by the NSA.
Microsoft is expanding the reach of its device management services.
Researcher finds building blocks for privilege escalation: Can they be assembled to create a flaw?