Select Page
Screenshot of obfuscated script

Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV

Consider this scenario: Two never-before-seen, heavily obfuscated scripts manage to slip past file-based detection and dynamically load an info-stealing payload into memory. The scripts are part of a social engineering campaign that tricks potential victims into running the scripts, which ... continue reading
The August release of SQL Operations Studio is now available

The August release of SQL Operations Studio is now available

We are excited to announce the August release of SQL Operations Studio is now available. Download SQL Operations Studio and review the Release Notes to get started. SQL Operations Studio is a data management tool that enables you to work ... continue reading
outlook-logo

First impression of the new Gmail Interface

As a Mac user I have been a little frustrated with using Gmail as there really is no Gmail user experience on the Mac as good as running Outlook 2016 on Windows 10 with G Suite Sync for Microsoft Outlook ... continue reading
Image of four hands collaborating over a drawing of a lightbulb.

Enable your users to work securely from anywhere, anytime, across all of their devices

This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 Security solutions. In this series youll find context, answers, and guidance for deployment and driving adoption within your organization ... continue reading

Use Windows Information Protection (WIP) to help make accidental data leakage a thing of the past

Have you always wished you could have mobile application management (MAM) on Windows? Now you can! Windows Information Protection (WIP) is an out-of-the box data leakage prevention feature for Windows 10 that can automatically apply protection for work files and ... continue reading
It’s Gone To Plaid: Storage Replica and Chelsio iWARP Performance

It’s Gone To Plaid: Storage Replica and Chelsio iWARP Performance

Hi folks, Ned here again. A few years ago, I demonstrated using Storage Replica as an extreme data mover, not just as a DR solution; copying blocks is a heck of lot more efficient than copying files. At the time, ... continue reading
Invisible resource thieves: The increasing threat of cryptocurrency miners

Invisible resource thieves: The increasing threat of cryptocurrency miners

The surge in Bitcoin prices has driven widescale interest in cryptocurrencies. While the future of digital currencies is uncertain, they are shaking up the cybersecurity landscape as they continue to influence the intent and nature of attacks. Cybercriminals gave cryptocurrencies ... continue reading
Detonating a bad rabbit: Windows Defender Antivirus and layered machine learning defenses

Detonating a bad rabbit: Windows Defender Antivirus and layered machine learning defenses

Windows Defender Antivirus uses a layered approach to protection: tiers of advanced automation and machine learning models evaluate files to reach a verdict on suspected malware. While Windows Defender AV detects a vast majority of new malware files at first ... continue reading
Detonating a bad rabbit: Windows Defender Antivirus and layered machine learning defenses

Detonating a bad rabbit: Windows Defender Antivirus and layered machine learning defenses

Windows Defender Antivirus uses a layered approach to protection: tiers of advanced automation and machine learning models evaluate files in order to reach a verdict on suspected malware. While Windows Defender AV detects a vast majority of new malware files ... continue reading
Loading...