Select Page
Within seconds attackers can find exploitable IoT targets that can become a point of entry into a business network. Once inside they can find sensitive information within minutes. In a hours time valuable data can be exfiltrated and for sale on the Darkweb.

How Microsoft Defender for IoT can secure your IoT devices

Cybersecurity threats are always evolving, and today we’re seeing a new wave of advanced attacks specifically targeting IoT devices used in enterprise environments as well as operational technology (OT) devices used in industrial systems and critical infrastructure (like ICS/SCADA). It’s ... continue reading
Screenshot of csrutil showing the SIP status

Microsoft finds new macOS vulnerability, Shrootless, that could bypass System Integrity Protection

Microsoft has discovered a vulnerability that could allow an attacker to bypass System Integrity Protection (SIP) in macOS and perform arbitrary operations on a device. We also found a similar technique that could allow an attacker to elevate their privileges ... continue reading
Image shows the Wildlife Protection Solutions logo

Microsoft powers transformation at NVIDIA GTC Fall—GPU technology conference

Customers around the world rely on Microsoft Azure to drive innovations related to our environment, public health, energy sustainability, weather modeling, economic growth, and more. Finding solutions to these important challenges requires huge amounts of focused computing power. Customers are ... continue reading
Graphic summary of information presented in the Bringing together hardware and software security section of the BeeKeeperAI blog. Image depicts the step-by-step process of how BeeKeeperAI works and utilizes hexagon style visuals to evoke a honeycomb style with icons representing the different steps of the process.

Accelerating healthcare AI innovation with Zero Trust technology

From research to diagnosis to treatment, AI has the potential to improve outcomes for some treatments by 30 to 40 percent and reduce costs by up to 50 percent. Although healthcare algorithms are predicted to represent a $42.5B market by ... continue reading
Screenshot of HTML code showing zero-point font technique

Franken-phish: TodayZoo built from other phishing kits

A phishing kit built using pieces of code copied from other kits, some available for sale through publicly accessible scam sellers or are reused and repackaged by other kit resellers, provides rich insight into the state of the economy that ... continue reading

Increase ROI and business impact with Azure Machine Learning

A growing number of organizations are taking advantage of machine learning to increase efficiency, enhance customer experiences and drive innovation. With increasing use of machine learning, customers might wish to consider a cost-benefit and value analysis across infrastructure, operations, and ... continue reading
Pie graph showing DART engagement metrics by industry spanning from July 2020-June 2021. According to the graph, Consumer/Retail industry holds the highest engagement rate with 13 percent and Energy industry ranks the lowest at just 4 percent.

How cyberattacks are changing according to new Microsoft Digital Defense Report

In 2021, cybercrime has become more sophisticated, widespread, and relentless. Criminals have targeted critical infrastructure—healthcare,1 information technology,2 financial services,3 energy sectors4—with headline-grabbing attacks that crippled businesses and harmed consumers. But there are positive trends—victims are coming forward, humanizing the toll ... continue reading
Individual TCP-DS 10TB query runtimes between Spark 2.4 and Spark 3.1. Chart shows that average runtimes across all queries are 30 lower, highlighting the benefits of using Spark 3.1 with CU13.

What’s new with SQL Server Big Data Clusters—CU13 Release

SQL Server Big Data Clusters (BDC) is a capability brought to market as part of the SQL Server 2019 release. Big Data Clusters extends SQL Server's analytical capabilities beyond in-database processing of transactional and analytical workloads by uniting the SQL ... continue reading
Image shows arrows in a circle with steps in the supply chain process including plan, source, make, deliver, manage, service and decom. In the center of the circle is the word “capacity,” since each activity supports delivering capacity to customers. Underneath the circle is a box that says “systems and data enable end-to-end value chain of activities.” Together each activity in the circle informs the next to deliver continuous improvement.

Advancing reliability through a resilient cloud supply chain

“My Advancing Reliability series has explored many initiatives we’ve put in place to improve the reliability of the Azure platform. Today, I’d like to explore our cloud supply chain, as a resilient hardware infrastructure is critical to provide reliable capacity ... continue reading
Table showing differences between phishing kits and phishing-as-a-service

Catching the big fish: Analyzing a large-scale phishing-as-a-service operation

In researching phishing attacks, we came across a campaign that used a rather high volume of newly created and unique subdomains—over 300,000 in a single run. This investigation led us down a rabbit hole as we unearthed one of the ... continue reading