Recent Blogs
Co-authors: Kayla Rohde & Kenneth Johnson
Having multiple cybersecurity technologies, controls, systems, and stakeholders operating together without conflict is not a temporary inconvenience. It is...
Apr 30, 2026256Views
0likes
0Comments
In the world of identity security, few tools promise as much peace of mind as Privileged Access Management (PAM). It is often referred to as the "vault" that locks away your kingdom's keys. However, ...
Apr 15, 2026517Views
3likes
1Comment
In this part of the “Hunting Infostealers” series, we explore the growing abuse of trusted communication services and software ecosystems—including messaging platforms like WhatsApp and seemingly ben...
Apr 15, 2026299Views
0likes
0Comments
9 MIN READ
In this next part of the “Hunting Infostealers” series, we’ll cover Python information stealers. The proliferation of Python stealers over the past year has become an escalating concern in the cybers...
Apr 08, 2026334Views
0likes
0Comments
11 MIN READ
The “Hunting Infostealers” blog series covers the ever-evolving threat of infostealers. Infostealers have gone from simple credential theft to subscription-based threats (i.e., Malware-as-a-Service) ...
Apr 01, 2026725Views
0likes
0Comments
Attackers compromised the upstream distribution mechanism for EmEditor, a widely used Windows text editor. Instead of delivering malware through phishing or malicious domains, the attackers manipulat...
Mar 10, 2026755Views
3likes
2Comments
Co-authors: Dan Weinstock and Christoph Dreymann
Azure Virtual Desktop (AVD) has rapidly become a core tool for enabling remote work at scale. Consequently, it’s also emerging as a target for threa...
Feb 03, 20262.1KViews
0likes
0Comments
By: Mukta Agarwal and Parth Jamodkar
Threat actors are increasingly infiltrating organizations by securing legitimate jobs, often through falsified credentials or insider recruitment.
Recently, ...
Dec 18, 20251.2KViews
1like
0Comments
Co-author: Samantha Gardener
To stay ahead of today’s sophisticated cyber threats, organizations must embrace a proactive defense strategy that includes these three pillars: emerging trends, adapti...
Dec 02, 20251.6KViews
0likes
0Comments
When threat actors infiltrate a company to steal documents and other critical business information, Microsoft Incident Response - the Detection and Response Team (DART) responds. With more than 4,500...
Nov 25, 20252.3KViews
0likes
0Comments
Tags
- defender experts for xdr45 Topics
- defender experts for hunting32 Topics
- microsoft incident response (ir)30 Topics
- Industry Expert Series8 Topics