Azure News - October 20th, 2025
1. Attack chain targeting Azure Blob Storage — Microsoft Threat Intelligence Microsoft’s Threat Intelligence team published a detailed analysis of an active attack chain that targets Azure Blob Storage. The report describes how adversaries pivot from initial compromise to enumerate storage accounts, abuse SAS tokens and credential leaks, run code to exfiltrate blobs, and use legitimate Azure tooling to stay stealthy. Microsoft outlines detection indicators, mitigation steps (harden storage access, rotate keys, enforce least-privilege SAS policies, and enable Defender for Cloud protections), and recommended hunting queries. If you run blob storage at scale, this is operationally urgent: follow the guidance and audit recent access/logs immediately. Microsoft 2. Microsoft’s Scott Guthrie: ‘Explosion’ of agentic AI and Azure growth In a wide-ranging interview, Scott Guthrie (Microsoft EVP, Cloud + AI) said we’re entering an “explosion” of agentic AI — systems that act on behalf of users — and described Azure’s strategy to support multiple model providers, diversified chip partnerships, and disciplined capacity build-outs. Guthrie framed the change as comparable in scale to the Industrial Revolution, and emphasized customer choice (OpenAI, Anthropic, in-house models) and investments to keep Azure resilient and performant as demand surges. For architects, the message is clear: design for agentic workflows, flexible model routing, and capacity variability. Barron's 3. October Patch Tuesday: broad Microsoft security fixes (important for Azure customers) October’s Patch Tuesday was unusually large, with vendors and security firms flagging ~170+ CVEs fixed across Microsoft products including Entra ID, Windows Server, SQL Server, and components used in Azure services. Analysts urged Azure customers to prioritize critical updates, validate managed services patching windows, and confirm that platform-provided resources (PaaS services, managed VMs) have received vendor patches. The cadence and scale of fixes mean cloud teams should verify automation, test in staging, and ensure monitoring alerts for unpatched service components.