Recent Blogs
4 MIN READ
The cybersecurity threat landscape continues to evolve with novel attacks and techniques emerging each day. Microsoft Defender Experts for Hunting, included with Microsoft Defender Experts for XDR, h...
Nov 03, 2025165Views
1like
0Comments
Threats like password spray or adversary-in-the-middle (AiTM) are routine and too easily overlooked in an endless stream of security alerts. But what if these routine threats are only a small part of...
Oct 27, 2025493Views
1like
0Comments
7 MIN READ
In today’s rapidly evolving threat landscape, cybersecurity demands more than just great technology—it requires great teamwork. That’s the story behind the collaboration between Microsoft Defender Ex...
Sep 18, 2025338Views
0likes
0Comments
Co-authors - Christoph Dreymann - Shiva P
Introduction
Azure Storage Accounts are frequently targeted by threat actors. Their goal is to exfiltrate sensitive data to an external infrastructure un...
Sep 02, 20253.5KViews
2likes
0Comments
Co-authors - Raae Wolfram | Sam Gardener
Once an attacker has gained access to a system, the browser becomes a rich source of credentials, a platform for persistence, and a stealthy channel for dat...
Aug 25, 2025730Views
0likes
0Comments
Updated August 11, 2025
Microsoft Defender Experts for XDR
Microsoft Defender Experts for XDR is a managed extended detection and response (MXDR) service that triages, investigates, and respo...
Aug 15, 2025698Views
1like
0Comments
Microsoft Defender Experts manages and investigates incidents for some of the world’s largest organizations. We understand the challenges facing our customers and are always looking for ways to respo...
Aug 14, 2025449Views
3likes
0Comments
7 MIN READ
Forensic readiness in the cloud
Forensic readiness in the cloud refers to an organization’s ability to collect, preserve, and analyze digital evidence in preparation for security incidents.
Foren...
Aug 11, 20251.9KViews
4likes
1Comment
From memory dumps to filesystem browsing
Historically, threat groups like Lorenz have relied on tools such as Magnet RAM Capture to dump volatile memory for offline analysis. While this approach ca...
Aug 05, 2025810Views
2likes
0Comments
Co-authors: Henry Yan, Sr. Product Marketing Manager and Sylvie Liu, Principal Product Manager
Security Operations Centers (SOCs) are under extreme pressure due to a rapidly evolving threat lan...
Aug 04, 20253KViews
3likes
0Comments
Resources
Tags
- defender experts for xdr37 Topics
- defender experts for hunting29 Topics
- microsoft incident response (ir)22 Topics
- Industry Expert Series9 Topics