Recent Blogs
9 MIN READ
In this next part of the “Hunting Infostealers” series, we’ll cover Python information stealers. The proliferation of Python stealers over the past year has become an escalating concern in the cybers...
Apr 08, 2026192Views
0likes
0Comments
11 MIN READ
The “Hunting Infostealers” blog series covers the ever-evolving threat of infostealers. Infostealers have gone from simple credential theft to subscription-based threats (i.e., Malware-as-a-Service) ...
Apr 01, 2026398Views
0likes
0Comments
Attackers compromised the upstream distribution mechanism for EmEditor, a widely used Windows text editor. Instead of delivering malware through phishing or malicious domains, the attackers manipulat...
Mar 10, 2026679Views
3likes
2Comments
Co-authors: Dan Weinstock and Christoph Dreymann
Azure Virtual Desktop (AVD) has rapidly become a core tool for enabling remote work at scale. Consequently, it’s also emerging as a target for threa...
Feb 03, 20262KViews
0likes
0Comments
By: Mukta Agarwal and Parth Jamodkar
Threat actors are increasingly infiltrating organizations by securing legitimate jobs, often through falsified credentials or insider recruitment.
Recently, ...
Dec 18, 20251.1KViews
1like
0Comments
Co-author: Samantha Gardener
To stay ahead of today’s sophisticated cyber threats, organizations must embrace a proactive defense strategy that includes these three pillars: emerging trends, adapti...
Dec 02, 20251.6KViews
0likes
0Comments
When threat actors infiltrate a company to steal documents and other critical business information, Microsoft Incident Response - the Detection and Response Team (DART) responds. With more than 4,500...
Nov 25, 20252KViews
0likes
0Comments
Co-authors:
Sylvie Liu, Principal Product Manager
Rajiv Bharadwaja, Principal Software Engineering Manager
Abhishek Kumar, Principal Group Manager - Security Research & Operations
Security ...
Nov 18, 20259.7KViews
4likes
0Comments
3 MIN READ
Many people aren’t aware that Microsoft security isn't just about Microsoft, it’s also about the platforms supporting the products we build. This means our reach extends across all operating systems:...
Nov 13, 2025236Views
0likes
0Comments
As organizations embed AI across their business, the same technology that drives productivity also introduces a new class of risk: prompts that can be manipulated, data that can be leaked, and AI sys...
Nov 11, 20251.5KViews
2likes
0Comments
Tags
- defender experts for xdr44 Topics
- defender experts for hunting32 Topics
- microsoft incident response (ir)30 Topics
- Industry Expert Series8 Topics