May 2025 has seen significant updates from Microsoft across various sectors, primarily focusing on security enhancements and the continued evolution of its AI Copilot technology. This month’s news covers advancements in AI reasoning capabilities, new security vulnerabilities, and significant developments in Microsoft’s Copilot ecosystem. Concerns regarding malicious software packages and ongoing cyber threats also highlight the ongoing importance of security awareness and proactive measures.

Key Developments & Updates for Microsoft Updates

Copilot Advancements

  • Microsoft 365 Copilot Tuning: Microsoft announced Copilot Tuning at Build 2025, a low-code capability in Copilot Studio allowing organizations to customize AI models with their own data. This offers enhanced personalization and workflow integration. (Source: Microsoft 365 Blog)
  • Copilot for Students: US-based college students can now access a three-month free trial of Microsoft 365 Personal, including Copilot access. This expansion aims to increase student familiarity and adoption of the AI assistant. (Source: Microsoft 365 Blog)
  • Agent2Agent (A2A) Protocol Support: Microsoft is now supporting A2A interoperability in Azure AI Foundry and Copilot Studio, enabling more sophisticated multi-agent applications. This facilitates greater collaboration between different AI agents. (Source: Microsoft 365 Blog)
  • Copilot Studio Updates: April 2025 updates to Copilot Studio included features like new connectors and improved key management, further strengthening functionality and security. (Source: Microsoft 365 Blog)

Security Concerns and Updates

  • Malicious NPM Packages: Sixty malicious packages on the Node Package Manager (NPM) registry were discovered stealing host and network data. Users are urged to review their dependencies and update accordingly. (Source: BleepingComputer)
  • Cetus Protocol Hack: A significant cryptocurrency heist saw hackers steal $223 million from the Cetus Protocol decentralized exchange. This highlights the continued vulnerability of cryptocurrency platforms to sophisticated attacks. (Source: BleepingComputer)
  • Luna Moth Extortion Attacks: The FBI issued a warning about the Luna Moth extortion gang, which is targeting U.S. law firms with callback phishing and social engineering attacks. Law firms should be especially vigilant against these tactics. (Source: BleepingComputer)
  • TikTok Malware Distribution: Cybercriminals are leveraging TikTok videos to distribute Vidar and StealC infostealer malware. Users need to exercise caution when interacting with content from unknown sources on social media platforms. (Source: BleepingComputer)
  • Microsoft Security Response Center Activities: The MSRC announced the winners of their Q1 2025 Security Researcher Recognition Program and the results of the Zero Day Quest 2025, a live hacking competition focused on Copilot and Cloud security. This demonstrates Microsoft’s ongoing commitment to proactive security measures. (Source: Microsoft Security Response Center)
  • AI Jailbreaking Concerns: Microsoft’s research reveals that jailbreaking leading AI systems is simpler than previously thought, highlighting the need for robust safeguards against prompt injection attacks. The publication of this research underscores the importance of continuous improvement in AI security. (Source: Microsoft Security Response Center)

Microsoft Product Updates and Feedback

  • Office App Differences (Windows vs. Mac): Reddit discussions highlight ongoing differences between Windows and Mac versions of Microsoft Office applications, leading to user frustration and questions about future parity. (Source: Reddit/r/Microsoft)
  • Microsoft Fabric Integration: Microsoft is integrating transactional databases with its Fabric analytics system, improving data management and analysis capabilities. (Source: Reddit/r/Microsoft)

Sources Consulted

This article was synthesized using information from:

Note: While efforts are made to accurately represent information, this article is a synthesis of publicly available data and may not be completely exhaustive.

Check out our brand new phishing analysis tool! let us know what improvements you would like to see! Phishing URL Check


Leave a Reply