Our Latest News
Get creation dates of all Azure resources under an Azure subscription
Overview: One of our Azure customers raised a support ticket to find out the creation dates for all their resources on their Azure subscription. This blog shows you one of the ways to achieve that. Step 1: Create an Azure service principal with the az ad...
Office 365 receives Multi-Tier Cloud Security (MTCS) SS584:2020 Level-3 Certification (2021)
Multi-Tier Cloud Security (MTCS) SS584:2020 Overview MTCS, a cloud security standard, was developed by the Information Technology Standards Committee (ITSC) in Singapore and published in November 2013 for its first version. The ITSC promotes and facilitates...
Apache Releases Security Update for HTTP Server
Official websites use .govA .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure...
Mitigating Log4Shell and Other Log4j-Related Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), National Security Agency (NSA), Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), the Computer Emergency Response Team New Zealand...
Mitigating Log4Shell and Other Log4j-Related Vulnerabilities
CISA, the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and the cybersecurity authorities of Australia, Canada, New Zealand, and the United Kingdom have released a joint Cybersecurity Advisory in response to multiple vulnerabilities...
Azure Marketplace new offers – Volume 180
We continue to expand the Azure Marketplace ecosystem. For this volume, 109 new offers successfully met the onboarding criteria and went live. See details of the new offers below: Get it now in our marketplace AlmaLinux 8.5: This image offered by Cognosys...
Vulnerability Summary for the Week of December 13, 2021
N/A -- N/A pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak. 2021-12-16 not yet calculated CVE-2021-45095MISCMISC addons-ssh -- addons-ssh ** DISPUTED ** The addon.stdin service in addon-ssh (aka Home Assistant...
SAM Name impersonation
During the November security update cycle, Microsoft released a patch for two new vulnerabilities, CVE-2021-42287 and CVE-2021-42278. Both vulnerabilities are described as a ‘Windows Active Directory domain service privilege escalation vulnerability’. A few...
United against scams
Kwanzaa, which is based on traditional African harvest festivals, is celebrated every year from December 26 to January 1. The first principle of Kwanzaa is Umoja (unity) and the importance of finding ways to stay united and working together. Pulling together to...
AG force failover to DR, then reconnect to Prod nodes. Will AG keep Prod data or DR data ?
I made a test in my testing environment. Below are my test results I have 3 nodes in this Alwayson. CPS2019VM3 is DR node. I set firewall rules in VM1 and VM2 to block all network traffics from/to VM3. You can see VM3 became ‘Resolving’ state. ...
Extracting SAP data using OData – Part 6 – Introduction to delta extraction
Before implementing data extraction from SAP systems please always verify your licensing agreement. After five episodes of going through basic data extraction scenarios, we finally can deep dive into a more advanced topic. I already explained how crucial is...
A Reusable Search Control for FHIR
Searching a FHIR resource is simple. But what if you want to create a highly reusable search form? In this article we walk through a highly reusable search control. FHIR Search Scenario Let’s say we have a list of patients. Our app displays...
Recent Comments