Select Page
Molish_0-1671016671260.png

December 2022 monthly security updates for Hyper-V servers impacts SCVMM SDN deployments

Monthly security updates (KB and KB 5021237) for Hyper-V hosts released on Dec 13th, 2022, have known issues that impacts SCVMM managed SDN (Software Defined Networking) deployments and this creates failures with new VM creation and virtual network assignment. Impacted scenarios: ... continue reading
Graphical user interface; text

Gatekeeper’s Achilles heel: Unearthing a macOS vulnerability

On July 27, 2022, Microsoft discovered a vulnerability in macOS that can allow attackers to bypass application execution restrictions imposed by Apple’s Gatekeeper security mechanism, designed to ensure only trusted apps run on Mac devices. We developed a proof-of-concept exploit ... continue reading
™

Microsoft supports the DoD’s Zero Trust strategy

The Department of Defense (DoD) released its formal Zero Trust strategy today, marking a major milestone in its goal of achieving enterprise-wide implementation by 2027. The strategy comes at a critical time as United States government networks continue to face ... continue reading
Global distribution map displaying exposed Boa web servers over the span of a week.

Vulnerable SDK components lead to supply chain risks in IoT and OT environments

Vulnerabilities in network components, architecture files, and developer tools have become increasingly popular attack vectors to gain access into secure networks and devices. External tools and products that are managed by vendors and developers can pose a security risk, especially ... continue reading
Bar chart showing the number of DDoS attacks and duration distribution from March 2021-May 2022.

2022 holiday DDoS protection guide

The holiday season is an exciting time for many people as they get to relax, connect with friends and family, and celebrate traditions. Organizations also have much to rejoice about during the holidays (for example, more sales for retailers and ... continue reading
TBD.

Empowering ISVs to build and sell with the Microsoft Cloud

Today, we are hosting our first-ever Marketplace Summit and giving every ISV and software as a service (SaaS) provider a virtual front-row seat to learn how to maximize marketplace opportunity and do more with less. While we enter uncertain economic ... continue reading
Table showing the AV-Comparatives test cases and the corresponding results for Microsoft Defender for Endpoint (rows) in the following areas (columns): LSASS dumping was possible, Extracting credentials (offline) from respective minidump file was possible, Prevention by AV module, and Detection by EDR module.

Detecting and preventing LSASS credential dumping attacks

Obtaining user operating system (OS) credentials from a targeted device is among threat actors’ primary goals when launching attacks because these credentials serve as a gateway to various objectives they can achieve in their target organization’s environment, such as lateral ... continue reading
The overall management architecture includes Microsoft Azure Arc, Microsoft Azure Storage, Microsoft Azure Monitoring, Microsoft Azure Kubernetes and Kubernetes for Operator RAN extension.

Scalable management of virtualized RAN with Kubernetes

Among the many important reasons why telecommunication companies should be attracted to Microsoft Azure are our network and system management tools. Azure has invested many intellectual and engineering cycles in the development of a sophisticated, robust framework that manages millions ... continue reading
Figure 1 shows three panels, each of an Azure region that consists of 3 availability zones. Panel 1 shows that within each Azure region is a virtual network that contains a sing subnet. A virtual machine scale set consists of multiple virtual machines that are deployed across all three zones within the single subnet. NAT gateway is attached to the subnet from zone 1. In panel 2, zone 1 is down, which causes a loss of outbound connectivity across all three zones since all outbound connectivity goes through the zone 1 NAT gateway. Panel 3 shows that if zone 2 goes down, only outbound connectivity for virtual machines from that zone goes down. Outbound connectivity from zone 1 and 3 persists since NAT gateway is in a zone not impacted by the zone 2 outage.

Ensure zone resilient outbound connectivity with NAT gateway

Our customers—across all industries—have a critical need for highly available and resilient cloud frameworks to ensure business continuity and adaptability of ever-growing workloads. One way that customers can achieve resilient and reliable infrastructures in Microsoft Azure (for outbound connectivity) is ... continue reading
fbinotto_0-1662504725093.png

Fun with Azure VPN

Introduction   Hi folks! My name is Felipe Binotto, Cloud Solution Architect, based in Australia. I decided to make this post for a couple reasons. The first reason is to demonstrate how you can quickly build a hub between your ... continue reading