Recent Blogs
Attackers compromised the upstream distribution mechanism for EmEditor, a widely used Windows text editor. Instead of delivering malware through phishing or malicious domains, the attackers manipulat...
Mar 10, 2026253Views
1like
0Comments
Co-authors: Dan Weinstock and Christoph Dreymann
Azure Virtual Desktop (AVD) has rapidly become a core tool for enabling remote work at scale. Consequently, it’s also emerging as a target for threa...
Feb 03, 20261.7KViews
0likes
0Comments
By: Mukta Agarwal and Parth Jamodkar
Threat actors are increasingly infiltrating organizations by securing legitimate jobs, often through falsified credentials or insider recruitment.
Recently, ...
Dec 18, 20251KViews
1like
0Comments
Co-author: Samantha Gardener
To stay ahead of today’s sophisticated cyber threats, organizations must embrace a proactive defense strategy that includes these three pillars: emerging trends, adapti...
Dec 02, 20251.5KViews
0likes
0Comments
When threat actors infiltrate a company to steal documents and other critical business information, Microsoft Incident Response - the Detection and Response Team (DART) responds. With more than 4,500...
Nov 25, 20251.5KViews
0likes
0Comments
Co-authors:
Sylvie Liu, Principal Product Manager
Rajiv Bharadwaja, Principal Software Engineering Manager
Abhishek Kumar, Principal Group Manager - Security Research & Operations
Security ...
Nov 18, 20259.6KViews
4likes
0Comments
3 MIN READ
Many people aren’t aware that Microsoft security isn't just about Microsoft, it’s also about the platforms supporting the products we build. This means our reach extends across all operating systems:...
Nov 13, 2025230Views
0likes
0Comments
As organizations embed AI across their business, the same technology that drives productivity also introduces a new class of risk: prompts that can be manipulated, data that can be leaked, and AI sys...
Nov 11, 20251.3KViews
1like
0Comments
4 MIN READ
The cybersecurity threat landscape continues to evolve with novel attacks and techniques emerging each day. Microsoft Defender Experts for Hunting, included with Microsoft Defender Experts for XDR, h...
Nov 03, 2025590Views
3likes
0Comments
Threats like password spray or adversary-in-the-middle (AiTM) are routine and too easily overlooked in an endless stream of security alerts. But what if these routine threats are only a small part of...
Oct 27, 20251.6KViews
1like
0Comments
Tags
- defender experts for xdr43 Topics
- microsoft incident response (ir)30 Topics
- defender experts for hunting29 Topics
- Industry Expert Series8 Topics