Select Page
wannacrypt1

WannaCrypt ransomware worm targets out-of-date systems

On May 12, 2017 we detected a new ransomware that spreads like a worm by leveraging vulnerabilities that have been previously fixed. While security updates are automatically applied in most computers, some users and enterprises may delay deployment of patches ... continue reading
https://robertsmit.wordpress.com/

Install System Center Configuration Manager version 1702/1704 #SCCM #Sysctr

In the past 6 months I haven’t done much with SCCM only sideways jobs but with all the new features in the Preview Branch SCCM will survive the Cloud. as it moves more and more to the cloud and integrates ... continue reading
Initial alerts triggered by PowerShell activities as detected by Windows Defender ATP

Windows Defender ATP thwarts Operation WilySupply software supply chain cyberattack

Several weeks ago, the Windows Defender Advanced Threat Protection (Windows Defender ATP) research team noticed security alerts that demonstrated an intriguing attack pattern. These early alerts uncovered a well-planned, finely orchestrated cyberattack that targeted several high-profile technology and financial organizations ... continue reading
new-slide-for-data-amp-blog-ss-2017

Delivering AI with data: the next generation of Microsoft’s data platform

This post was authored by Joseph Sirosh, Corporate Vice President, Microsoft Data Group Leveraging intelligence out of the ever-increasing amounts of data can make the difference between being the next market disruptor or being relegated to the pages of history ... continue reading
Execution stages of the exploit package and corresponding functionality

Detecting and mitigating elevation-of-privilege exploit for CVE-2017-0005

On March 14, 2017, Microsoft released security bulletin MS17-013 to address CVE-2017-0005, a vulnerability in the Windows Win32k component that could potentially allow elevation of privileges. A report from a trusted partner identified a zero-day exploit for this vulnerability. The ... continue reading
figure-1

Five reasons to run SQL Server 2016 on Windows Server 2016 — No. 1: Security

This is the first blog in a five-part series. Keep an eye out for upcoming posts, which will cover cutting costs and improving performance of storage, BI, and analytics; improving uptime and reliability; reaching data insights faster by running analytics ... continue reading
nsis-old-vs-new

Ransomware operators are hiding malware deeper in installer packages

We are seeing a wave of new NSIS installers used in ransomware campaigns. These new installers pack significant updates, indicating a collective move by attackers to once again dodge AV detection by changing the way they package malicious code. These ... continue reading
cloud-based-storage-management

StorSimple in CSP

In February a long-awaited Azure solution - virtual StorSimple - became available for all CSP partners. Azure StorSimple is a Hybrid Storage solution from Microsoft. It can be deployed as a physical device or as a virtual appliance, and it ... continue reading

Loading files from Azure Blob Storage into Azure SQL Database

Azure SQL Database enables you to directly load files stored on Azure Blob Storage using the BULK INSERT T-SQL command and OPENROWSET function. WITH (DATA_SOURCE = 'MyAzureBlobStorageAccount'); BULK INSERT is existing command in T-SQL language that enables you to load files from file system into a table.continue reading
ORCA_Banner

(Part 1) Windows Server 2016 – Shielded Virtual Machines Overview

In this video we will take a look at the new security feature in Windows Server 2016 – Shielded Virtual Machines. This feature is much more than just encryption but rather a Hyper-V powered virtualization guarded fabric that brings a ... continue reading