18 Ottobre 2022
Defenders beware: A case for post-ransomware investigations

Ransomware is one of the most pervasive threats that Microsoft Detection and Response Team (DART) responds to today. The groups[…]

Read More
29 Maggio 2025
Defending against evolving identity attack techniques

In today’s evolving cyber threat landscape, threat actors are committed to advancing the sophistication of their attacks. The increasing adoption[…]

Read More
3 Ottobre 2023
Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement

Microsoft security researchers recently identified a campaign where attackers attempted to move laterally to a cloud environment through a SQL[…]

Read More
10 Aprile 2018
Define a data volume cap in Log Analytics

In Azure Log Analytics, you can enable the daily volume cap and limit the daily ingestion for your workspace. Source:[…]

Read More
0
13 Dicembre 2023
Delaying Domain Front Block on AFD and CDN services

Azure Front Door and Azure CDN Standard from Microsoft (classic) are postponing the domain fronting blocking enforcement to January 22,[…]

Read More
22 Ottobre 2018
Deleting abandoned AKS clusters

Delete your Azure Kubernetes Service abandoned deployments if you have just deleted the resource group that contains all the resources[…]

Read More
0