Our Latest News
Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks
Summary Actions to Take Today to Protect Against Malicious Activity* Search for indicators of compromise.* Use antivirus software.* Patch all systems.* Prioritize patching known exploited vulnerabilities.* Train users to recognize and report phishing attempts.* Use...
Iranian Government-Sponsored MuddyWater Actors Conducting Malicious Cyber Operations
CISA, the Federal Bureau of Investigation (FBI), U.S. Cyber Command Cyber National Mission Force (CNMF), the United Kingdom’s National Cyber Security Centre (NCSC-UK), and the National Security Agency (NSA) have issued a joint Cybersecurity Advisory...
DeVry students, read this
If you went to DeVry, you might have already gotten money back from the FTC. That’s thanks to a 2016 FTC settlement with the school over allegations that it didn’t tell the truth about how likely it was that its grads could get jobs in their field, or how much they’d...
What's New: Search, Basic Ingestion, Archive, and Data Restoration are Now in Public Preview
Note: Thank you to @Yaniv Shasha , @Sreedhar_Ande , @JulianGonzalez , and @Ben Nick for helping deliver this preview. We are excited to announce a new suite of features entering into public preview for Microsoft Sentinel. This suite of...
Microsoft HoloLens 2 and mixed reality bridge physical reality and digital experiences
Across industries, companies are finding practical ways to bridge physical reality and digital experiences using hands-free headsets and augmented reality solutions to inform decisions and action on insights produced by smart, connected solutions.Mixed realitya set of...
New Sandworm Malware Cyclops Blink Replaces VPNFilter
Summary The Sandworm actor, which the United Kingdom and the United States have previously attributed to the Russian GRU, has replaced the exposed VPNFilter malware with a new more advanced framework. The United Kingdom's (UK) National Cyber Security Centre (NCSC),...
Build a trusted authentication service for Azure Communication Services using Azure Active Directory
We’re releasing a new service sample to help you build secure voice, video, and chat applications. This sample provides you with an easy to deploy, trusted authentication service to generate Azure Communication Services identities and access tokens. It is available...
The top frauds of 2021
Every year, people report fraud, identity theft, and bad business practices to the FTC and its law enforcement partners. In 2021, 5.7 million people filed reports and described losing more than $5.8 billion to fraud — a $2.4 billion jump in losses in one year. You can...
Tutorial: Publish Azure Static Web Apps with Bitbucket
In this tutorial, you learn to: Set up an Azure Static Web Apps site for a Vanilla API sample app Create a Bitbucket Pipeline to build and publish a static web app Prerequisites Active Azure account: If you don't have one, you...
Vulnerability Summary for the Week of February 14, 2022
389-ds-base -- 389-ds-base A double-free was found in the way 389-ds-base handles virtual attributes context in persistent searches. An attacker could send a series of search requests, forcing the server to behave unexpectedly, and crash. 2022-02-18 not yet...
Experiencing Data Latency for Log Analytics – South UK – 02/20 – Resolved
Final Update: Sunday, 20 February 2022 16:57 UTCWe've confirmed that all systems are back to normal as of 02/20, 16:52 UTC. Our logs show the incident started on 02/20, 07:34 UTC and that during the duration of incident customers in South UK using Azure Log Analytics,...
Lesson Learned #185: Could not find any endpoints error message using PingFederated
Today, I worked on an interesting service that our customer faced the following error message "Error code 0xA190; state 41360 - Could not find any endpoints." using SqlCmd/ODBC in combination with -G to connect to Azure Active Directory. We have the...



Recent Comments