As we get closer to October 2025 and the end of Windows 10 support, Windows 11 will pick up its pace and soon become the most popular desktop operating system worldwide.
That's an assertion. It's also quite possible that the only growth will come from attrition as people and companies buy new machines that only come with Win11. It's also possible that we'll get a literal repeat of Win XP and Win 7, where a large number of users just waited until Microsoft gave in and fixed the core problems that the consumers were complaining about in Win Vista and Win 8 when they released Win 7 and Win 10.
Microsoft and Crowdstrike announce partnership on threat actor naming by Pradeep Viswanathan
Whenever a cyberattack is discovered, companies disclose it to the public and assign it a unique name based on their internal procedures. Unfortunately, this leads to inconsistencies, as each company has its own naming conventions. As a result, the same threat actor behind a cyberattack may end up with multiple names, causing delays and confusion in response efforts.
For example, a threat actor that Microsoft refers to as Midnight Blizzard might be known as Cozy Bear, APT29, or UNC2452 by other security vendors.
To address this issue, Microsoft and CrowdStrike are teaming up. These companies will align their individual threat actor taxonomies to help security professionals respond to cyberattacks with greater clarity and confidence.
It’s important to note that Microsoft and CrowdStrike are not attempting to create a single naming standard. Instead, they are releasing a mapping that lists common threat actors tracked by both companies, matched according to their respective taxonomies. The mapping also includes corresponding aliases from each group’s naming system. You can view the joint threat actor mapping by Microsoft and CrowdStrike here.
Although this threat actor taxonomy mapping is a joint effort between Microsoft and CrowdStrike, Google/Mandiant and Palo Alto Networks' Unit 42 are expected to contribute to this initiative in the future.
Vasu Jakkal, Corporate Vice President of Microsoft Security, wrote the following about this collaboration with CrowdStrike:
As more organizations join this initiative, the collective defense against cyber threats will undoubtedly be improved.
Question
eliokh
Hello,
I have the following task:
1- Generate a pdf file in java using a certain library (probably i-text).
2- Save the generated file to a database
3- Retrieving an already saved file from the database and sending it to a client via HTTP.
I have the following questions:
1- Is it possible to save the generated file in the database (in a BLOB) directly WITHOUT physically creating it?'
2- Is it possible to read the file from database and send it to the user as object, without saving it physically on the server?
I know we can save them in a temporary directoty but i prefer not to have anything physical.
Currently i can do save a PHYSICAL file in DB, and retrieve a blob column into a PHYSICAL file from DB.
thank u in advance
Link to comment
https://www.neowin.net/forum/topic/1141430-java-generating-a-pdf-file-and-saving-it-in-oracle-database-the-retrieve/Share on other sites
1 answer to this question
Recommended Posts