Select Page
Diagram showing chain of attacks from the LemonDuck and LemonCat infrastructure, detailing specific attacker behavior common to both and highlight behavior unique to each infra

When coin miners evolve, Part 2: Hunting down LemonDuck and LemonCat attacks

[Note: In this two-part blog series, we expose a modern malware infrastructure and provide guidance for protecting against the wide range of threats it enables. Part 1 covered the evolution of the threat, how it spreads, and how it impacts ... continue reading
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure

When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure

[Note: In this two-part blog series, we expose a modern malware infrastructure and provide guidance for protecting against the wide range of threats it enables. Part 1 covers the evolution of the threat, how it spreads, and how it impacts ... continue reading
Step-by-Step: How to update an Azure Linux VM using Update management

Step-by-Step: How to update an Azure Linux VM using Update management

Operating system updates include feature updates, bug fixes, and security improvements and are important to update periodically. This applies to desktop computers as well as servers. There are many tools available to manage the Windows update process. When it comes ... continue reading
Azure Arc for Developers

Azure Arc for Developers

Azure Arc and the Azure control plane enables developers to build hybrid and mutlicloud architectures for their applications. Taking advantage of the Azure control plane to manage infrastructure and allows to deploy Azure services anywhere. This allows customers to build ... continue reading

How Microsoft Security empowers partners to build customer trust

As I reflect on my first year at Microsoft, it was both challenging and exceptional: from my remote onboarding in the middle of a pandemic to dramatic changes in the cyber landscape, to Microsoft’s critical role as a frontline responder ... continue reading
HoussemDellai_0-1625825418350.png

Kubernetes Nodepools Explained

Introduction This article will explain and show the use cases for using Nodepools in Kubernetes: What are nodepools ? What are System and User nodepools ? How to schedule application pods on a specific nodepool using Labels and nodeSelector ? ... continue reading
Azure Arc Overview

Azure Arc for Cloud Solutions Architects

Azure Arc and the Azure control plane enables Cloud Solutions Architects to build hybrid and mutlicloud architectures. Taking advantage of the Azure control plane to manage infrastructure and allows to deploy Azure services anywhere. This allows customers to build cloud ... continue reading
Screenshot of command line showing extraction of filesystem from the firmware

Microsoft finds new NETGEAR firmware vulnerabilities that could lead to identity theft and full system compromise

The continuous improvement of security solutions has forced attackers to explore alternative ways to compromise systems. The rising number of firmware attacks and ransomware attacks via VPN devices and other internet-facing systems are examples of attacks initiated outside and below ... continue reading
You just need to manage the image configuration and the images you’d like to have, Azure VM Image Builder service will take care of the rest for you

Streamline your custom image building process with Azure VM Image Builder service

Today we are announcing the general availability of the Azure VM Image Builder service, a managed service for you to build custom Linux or Windows virtual machine (VM) images with ease, and be compliant with your company’s security policy across ... continue reading

Announcement: Adding Support for Latest Linux OS in SCOM 2019 UR3

With SCOM 2019 UR3 onwards, Ubuntu 20.04, Debian 10, and Oracle Linux 8 are also supported via the Universal Linux MPs! The latest support matrix can be seen HERE. This support is in response to requests for supporting the latest ... continue reading