Recent Blogs
In the world of identity security, few tools promise as much peace of mind as Privileged Access Management (PAM). It is often referred to as the "vault" that locks away your kingdom's keys. However, ...
Apr 15, 2026301Views
3likes
1Comment
In this part of the “Hunting Infostealers” series, we explore the growing abuse of trusted communication services and software ecosystems—including messaging platforms like WhatsApp and seemingly ben...
Apr 15, 2026130Views
0likes
0Comments
9 MIN READ
In this next part of the “Hunting Infostealers” series, we’ll cover Python information stealers. The proliferation of Python stealers over the past year has become an escalating concern in the cybers...
Apr 08, 2026249Views
0likes
0Comments
11 MIN READ
The “Hunting Infostealers” blog series covers the ever-evolving threat of infostealers. Infostealers have gone from simple credential theft to subscription-based threats (i.e., Malware-as-a-Service) ...
Apr 01, 2026490Views
0likes
0Comments
Attackers compromised the upstream distribution mechanism for EmEditor, a widely used Windows text editor. Instead of delivering malware through phishing or malicious domains, the attackers manipulat...
Mar 10, 2026696Views
3likes
2Comments
Co-authors: Dan Weinstock and Christoph Dreymann
Azure Virtual Desktop (AVD) has rapidly become a core tool for enabling remote work at scale. Consequently, it’s also emerging as a target for threa...
Feb 03, 20262KViews
0likes
0Comments
By: Mukta Agarwal and Parth Jamodkar
Threat actors are increasingly infiltrating organizations by securing legitimate jobs, often through falsified credentials or insider recruitment.
Recently, ...
Dec 18, 20251.1KViews
1like
0Comments
Co-author: Samantha Gardener
To stay ahead of today’s sophisticated cyber threats, organizations must embrace a proactive defense strategy that includes these three pillars: emerging trends, adapti...
Dec 02, 20251.6KViews
0likes
0Comments
When threat actors infiltrate a company to steal documents and other critical business information, Microsoft Incident Response - the Detection and Response Team (DART) responds. With more than 4,500...
Nov 25, 20252.1KViews
0likes
0Comments
Co-authors:
Sylvie Liu, Principal Product Manager
Rajiv Bharadwaja, Principal Software Engineering Manager
Abhishek Kumar, Principal Group Manager - Security Research & Operations
Security ...
Nov 18, 20259.7KViews
4likes
0Comments
Tags
- defender experts for xdr44 Topics
- defender experts for hunting32 Topics
- microsoft incident response (ir)30 Topics
- Industry Expert Series8 Topics