
Azure Native New Relic Service: Full stack observability in minutes
Digital transformation across organizations has led to workloads shifting to multicloud and hybrid-cloud environments. Modern organizations are increasingly adopting cloud-native technologies including containers, microservices, serverless, and more. With the growing complexity of distributed applications deployed on a cloud-native landscape, can ... continue reading

Azure Native New Relic Service: Full stack observability in minutes
Digital transformation across organizations has led to workloads shifting to multicloud and hybrid-cloud environments. Modern organizations are increasingly adopting cloud-native technologies including containers, microservices, serverless, and more. With the growing complexity of distributed applications deployed on a cloud-native landscape, can ... continue reading
PowerShell/OpenSSH Team Investments for 2023
For , the team had set out lots of objectives and I’m happy to say we accomplished most of them! This year, we’re continuing on improving quality and also adding new features across our portfolio based on feedback from the ... continue reading

Unraveling the techniques of Mac ransomware
Ransomware continues to be one of the most prevalent and impactful threats affecting organizations, with attackers constantly evolving their techniques and expanding their tradecraft to cast a wider net of potential targets. This is evident in the range of industries, ... continue reading
Software Installation Using Machine Configuration and Azure Policy
I did a post a while ago on installing software onto virtual machines using policy state change events as the trigger. Now with the general availability of Azure Automanage Machine Configuration (formerly Azure Policy Guest Configuration) it’s time for a ... continue reading

Microsoft research uncovers new Zerobot capabilities
Botnet malware operations are a constantly evolving threat to devices and networks. Threat actors target Internet of Things (IoT) devices for recruitment into malicious operations as IoT devices’ configurations often leave them exposed, and the number of internet-connected devices continue ... continue reading

Gatekeeper’s Achilles heel: Unearthing a macOS vulnerability
On July 27, 2022, Microsoft discovered a vulnerability in macOS that can allow attackers to bypass application execution restrictions imposed by Apple’s Gatekeeper security mechanism, designed to ensure only trusted apps run on Mac devices. We developed a proof-of-concept exploit ... continue reading

MCCrash: Cross-platform DDoS botnet targets private Minecraft servers
Malware operations continue to rapidly evolve as threat actors add new capabilities to existing botnets, increasingly targeting and recruiting new types of devices. Attackers update malware to target additional operating systems, ranging from PCs to IoT devices, growing their infrastructure ... continue reading

Azure Monitor: Manage Data Access for Your Log Analytics Workspace
Gooooood morning readers I am back with another important topic arising from my customers’ visits. How can I give very specific access to Log Analytics data, whether they be Security or Monitoring data? Tricky one, isn’t it? A ... continue reading

Microsoft Security tips for mitigating risk in mergers and acquisitions
Sixty-two percent of organizations that undertake mergers and acquisitions face significant cybersecurity risks or consider cyber risks their biggest concern post-acquisition.1 Threat actors that focus on corporate espionage often target the acquiring company, which we will refer to as the ... continue reading