Our Latest News
Broadcom Software Discloses APT Actors Deploying Daxin Malware in Global Espionage Campaign
Broadcom Software—an industry member of CISA’s Joint Cyber Defense Collaborative (JCDC)—uncovers an advanced persistent threat (APT) campaign against select governments and other critical infrastructure targets in a publication titled Daxin: Stealthy Backdoor Designed...
Vulnerability Summary for the Week of February 21, 2022
accesspress_themes -- plugins_and_themes Numerous Plugins and Themes from the AccessPress Themes (aka Access Keys) vendor are backdoored due to their website being compromised. Only plugins and themes downloaded via the vendor website are affected, and those...
Adding DevOps on Form Recognizer for your custom model
Introduction Azure Form Recognizer is an amazing Azure AI Service to extract and analyze form fields documents. One benefit of using Form Recognizer is the ability to create your own custom model based on documents specific to your business...
Destructive Malware Targeting Organizations in Ukraine
Summary Actions to Take Today:• Set antivirus and antimalware programs to conduct regular scans.• Enable strong spam filters to prevent phishing emails from reaching end users.• Filter network traffic.• Update software.• Require multifactor authentication. Leading up...
CISA Releases Advisory on Destructive Malware Targeting Organizations in Ukraine
CISA and the Federal Bureau of Investigation have released an advisory on destructive malware targeting organizations in Ukraine. The advisory also provides recommendations and strategies to prepare for and respond to destructive malware. Additionally, CISA...
Experiencing Metrics Ingestion Latency for Azure Monitor in West US2 – 02/26 – Resolved
Final Update: Saturday, 26 February 2022 05:37 UTCWe've confirmed that all systems are back to normal with no customer impact as of 02/26, 05:00 UTC. Our logs show the incident started on 02/26, 00:30 UTC and that during the 4 hours & 30 minutes that it took...
CISA Adds Four Known Exploited Vulnerabilities to Catalog
CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed in the table below. These types of vulnerabilities are a frequent attack vector for...
New Modern Work for Gov Series: Teams Real Talk
How does using Microsoft Teams everyday make you feel? Does it improve your work? Impede it? Whether you are using Teams simply for 1:1 chat or for all your various collaboration throughout the day, we want to hear from you, the good, bad, and ugly.Join us for...
Mozilla Releases Security Update for Mozilla VPN
Official websites use .govA .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure...
SQL Server 2022: Introducing Buffer Pool Parallel Scan (Ep.5) | Data Exposed
In this episode of Data Exposed with David Pless and Anna Hoffman, we will discuss the new SQL Server 2022 Buffer Pool Parallel Scan improvement. Buffer Pool parallel scan improves the performance of scan operations on large-memory machines by utilizing multiple CPU...
From hiding your meeting video to Yammer community suggestions—here’s what’s new in Microsoft 365
This month, we’re bringing new capabilities to Microsoft Teams to help people focus on their presentation and stay on top of required trainings, provision Windows 365 Cloud PCs more easily, and more. The post From hiding your meeting video to Yammer community...
Achieving successful B2B selling in the digital era
With briefcases and suitcases in tow, business-to-business (B2B) sellers have always traveled the distance to meet buyers wherever they are. Buyers are going digital in a big way, so sellers can put away their bags (at least part of the time) and step into digital or...

Recent Comments