Select Page
sLoad launches version 2.0, Starslord

sLoad launches version 2.0, Starslord

sLoad, the PowerShell-based Trojan downloader notable for its almost exclusive use of the Windows BITS service for malicious activities, has launched version 2.0. The new version comes on the heels of a comprehensive blog we published detailing the malware’s multi-stage ... continue reading

Learning from cryptocurrency mining attack scripts on Linux

Cryptocurrency mining attacks continue to represent a threat to many of our Azure Linux customers. In the past, we've talked about how some attackers use brute force techniques to guess account names and passwords and use those to gain access ... continue reading
JB Hunt truck, linking to video

Turning to a new chapter of Windows Server innovation

Today, January 14, 2020, marks the end of support for Windows Server 2008 and Windows Server 2008 R2. Customers loved these releases, which introduced advancements such as the shift from 32-bit to 64-bit computing and server virtualization. While support for ... continue reading
Working with Azure Service Principal Accounts

Working with Azure Service Principal Accounts

When I worked with on-prem IT infrastructure I was always keen to automate parts as much as possible, whether that was setting up a scheduled task to stop and start services on temperamental servers or automating the patching of the ... continue reading
How To Install Log Analytics Gateway Using Load Balancers In Azure

How To Install Log Analytics Gateway Using Load Balancers In Azure

Hello everyone, after a long time, I am back with a new post. Today I will drive you through the configuration of a load balanced Log Analytics Gateway (formerly OMS Gateway and briefly referred below as LAGW) installed on Azure ... continue reading

The NcHostAgent Service Cannot be Located on the Computer

Hello everyone, my name is John Clyburn and I am a Sr. consultant in MCS. I’ve recently been working with Software Defined Networking (SDNv2). I’ve been primarily working with Windows Server 2019 and VMM 2019, deploying the solution using VMM ... continue reading
Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks

Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks

Computers with Windows Remote Desktop Protocol (RDP) exposed to the internet are an attractive target for adversaries because they present a simple and effective way to gain access to a network. Brute forcing RDP, a secure network communications protocol that ... continue reading

Just go with the flow…. WorkFlow that is with Windows PowerShell

Doctor Scripto returns again with our good friend Joel Vickery, PFE who is going to touch on the use of Workflows In PowerShell. Take it away Joel! Following up on my original post Parallel Processing with jobs in PowerShell, I ... continue reading

Improvements to machine learning capabilities in SQL Server 2019

Many organizations seek to do more with their data than pump out dashboards and reports. Applying advanced analytical approaches such as machine learning is an essential arena of knowledge for any data professional. While database administrators (DBAs) don't necessarily have ... continue reading
Ring in the New Year with automated user provisioning from SAP SuccessFactors to Azure AD

Ring in the New Year with automated user provisioning from SAP SuccessFactors to Azure AD

Howdy folks, Today, I’m very excited to announce the public preview of automated inbound user provisioning from SAP SuccessFactors to Azure AD and on-premises AD. This builds on the momentum we have already established in simplifying how identities are managed ... continue reading