Keep reading
Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.
Using Power Automate for Covert Data Exfiltration in Microsoft 365
Eric Saraga
February 2, 2022
How threat actors can use Microsoft Power Automate to automate data exfiltration, C2 communication, lateral movement, and evade DLP solutions.
Last Week in Microsoft Azure: Week of April 12th
Jeff Brown
April 12, 2021
This week’s review covers new learning resources for Azure Bicep, a PowerShell project for automating Azure diagrams, and a deep dive into Azure Key Vault.
Getting Started with PowerShell Option Inputs
Michael Buckbee
November 17, 2014
PowerShell is the dominant method of automating tasks and scripting changes for Windows sysadmins. This article covers getting started with some basic PowerShell usage and how to pass optional customization...
How to Use Autoruns to Detect and Remove Malware on Windows
This article acts as a tutorial on how to use Sysinternals Autoruns to detect potentially unwanted software that is installed and running automatically on your device.