Following on from the previous post, Daniel continues exploring the Gootkit banking trojan, revealing its persistence techniques and other capabilities. The Gootkit Banking Trojan was discovered back in 2014, and utilizes the Node.JS library to perform a range of...
Category:
Now in beta: Managed Service for Microsoft Active Directory (AD)
Customers and partners have already been using Managed Service for Microsoft AD for their AD-dependent applications and VMs. Use cases include automatically "domain joining" new Windows VMs by integrating the service with Cloud DNS, hardening Windows VMs by applying...
Getting Started with Microsoft Azure Live Demo
Join us for a live overview of the portal and a demo of popular Azure products. See Azure in action as we demonstrate how to begin deploying resources. Join a live session to get your questions answered in real time by Azure technical experts and learn how to get help...
How Worldline puts APIs at the heart of payments services
Editor's note: Today we hear from Worldline, a financial services organization that creates and operates digital platforms handling billions of critical transactions between companies, partners, and customers every year. In this post, Wordline head of alliances and...
The Speed Read with Quentin Hardy: Keep it simple
Editor's note: The Speed Read is a column authored by Google Cloud's Quentin Hardy, examining important themes and hot topics in cloud computing. It previously existed as an email newsletter. Today, we're thrilled to welcome it to its new home on the Cloud blog.Some...
Microsoft Azure Training Day: Fundamentals
Join us at the free Microsoft Azure Training Day: Fundamentals to improve your understanding of cloud concepts and acquire the knowledge you need to earn the Microsoft Azure Fundamentals certification. Learn basic strategies for transitioning to the cloud along with...
macOS Incident Response | Part 2: User Data, Activity and Behavior
In the previous post in this intro series on macOS Incident Response, we looked at collecting device, file and system data. Today, in the second post we're going to take a look at retrieving data on user activity and behavior. Why Investigate User Behavior? There's a...
Music to their ears: microservices on GKE, Preemptible VMs improved Musiio’s efficiency by 7000%
While there are more components in our new architecture, they are all much less complex. Communication is done through a queue where each step of the pipeline reports its success status. Each sub-step takes less than 10 seconds and can easily and quickly resume from...
Reach Me
Request a Call Back by filling out and submitting the following form.






