Select Page
Screenshot showing the Azure Native New Relic Service offer on Azure marketplace. This page includes relevant tabs with information about the offer including Overview, Plans + Pricing, Support, and Rating + Reviews.

Azure Native New Relic Service: Full stack observability in minutes

Digital transformation across organizations has led to workloads shifting to multicloud and hybrid-cloud environments. Modern organizations are increasingly adopting cloud-native technologies including containers, microservices, serverless, and more. With the growing complexity of distributed applications deployed on a cloud-native landscape, can ... continue reading
Screenshot showing the Azure Native New Relic Service offer on Azure marketplace. This page includes relevant tabs with information about the offer including Overview, Plans + Pricing, Support, and Rating + Reviews.

Azure Native New Relic Service: Full stack observability in minutes

Digital transformation across organizations has led to workloads shifting to multicloud and hybrid-cloud environments. Modern organizations are increasingly adopting cloud-native technologies including containers, microservices, serverless, and more. With the growing complexity of distributed applications deployed on a cloud-native landscape, can ... continue reading

PowerShell/OpenSSH Team Investments for 2023

For , the team had set out lots of objectives and I’m happy to say we accomplished most of them! This year, we’re continuing on improving quality and also adding new features across our portfolio based on feedback from the ... continue reading
Screenshot of FileCoder’s enumeration logic.

Unraveling the techniques of Mac ransomware

Ransomware continues to be one of the most prevalent and impactful threats affecting organizations, with attackers constantly evolving their techniques and expanding their tradecraft to cast a wider net of potential targets. This is evident in the range of industries, ... continue reading
pic1.png

Software Installation Using Machine Configuration and Azure Policy

I did a post a while ago on installing software onto virtual machines using policy state change events as the trigger. Now with the general availability of Azure Automanage Machine Configuration (formerly Azure Policy Guest Configuration) it’s time for a ... continue reading
Screenshot of malware code, a script that is used to download a remote code administration tool

Microsoft research uncovers new Zerobot capabilities

Botnet malware operations are a constantly evolving threat to devices and networks. Threat actors target Internet of Things (IoT) devices for recruitment into malicious operations as IoT devices’ configurations often leave them exposed, and the number of internet-connected devices continue ... continue reading
Graphical user interface; text

Gatekeeper’s Achilles heel: Unearthing a macOS vulnerability

On July 27, 2022, Microsoft discovered a vulnerability in macOS that can allow attackers to bypass application execution restrictions imposed by Apple’s Gatekeeper security mechanism, designed to ensure only trusted apps run on Mac devices. We developed a proof-of-concept exploit ... continue reading
A geographical map that presents the countries where the devices affected by the botnet are located. Countries with affected devices are highlighted on the map in blue.

MCCrash: Cross-platform DDoS botnet targets private Minecraft servers

Malware operations continue to rapidly evolve as threat actors add new capabilities to existing botnets, increasingly targeting and recruiting new types of devices. Attackers update malware to target additional operating systems, ranging from PCs to IoT devices, growing their infrastructure ... continue reading
:smile:

Azure Monitor: Manage Data Access for Your Log Analytics Workspace

Gooooood morning readers    I am back with another important topic arising from my customers’ visits. How can I give very specific access to Log Analytics data, whether they be Security or Monitoring data?   Tricky one, isn’t it? A ... continue reading
Illustration of two circles coming together to illustrate two approaches to integrating the Acquisition within the organization’s IT environment. This can be to either directly connect to the IT environment of the acquisition and keep existing systems or migrate all information into the Parent organizations environment.

Microsoft Security tips for mitigating risk in mergers and acquisitions

Sixty-two percent of organizations that undertake mergers and acquisitions face significant cybersecurity risks or consider cyber risks their biggest concern post-acquisition.1 Threat actors that focus on corporate espionage often target the acquiring company, which we will refer to as the ... continue reading