Recent Blogs
Threats like password spray or adversary-in-the-middle (AiTM) are routine and too easily overlooked in an endless stream of security alerts. But what if these routine threats are only a small part of...
Oct 27, 2025392Views
1like
0Comments
7 MIN READ
In today’s rapidly evolving threat landscape, cybersecurity demands more than just great technology—it requires great teamwork. That’s the story behind the collaboration between Microsoft Defender Ex...
Sep 18, 2025333Views
0likes
0Comments
Co-authors - Christoph Dreymann - Shiva P
Introduction
Azure Storage Accounts are frequently targeted by threat actors. Their goal is to exfiltrate sensitive data to an external infrastructure un...
Sep 02, 20253.4KViews
2likes
0Comments
Co-authors - Raae Wolfram | Sam Gardener
Once an attacker has gained access to a system, the browser becomes a rich source of credentials, a platform for persistence, and a stealthy channel for dat...
Aug 25, 2025708Views
0likes
0Comments
Updated August 11, 2025
Microsoft Defender Experts for XDR
Microsoft Defender Experts for XDR is a managed extended detection and response (MXDR) service that triages, investigates, and respo...
Aug 15, 2025682Views
1like
0Comments
Microsoft Defender Experts manages and investigates incidents for some of the world’s largest organizations. We understand the challenges facing our customers and are always looking for ways to respo...
Aug 14, 2025441Views
3likes
0Comments
7 MIN READ
Forensic readiness in the cloud
Forensic readiness in the cloud refers to an organization’s ability to collect, preserve, and analyze digital evidence in preparation for security incidents.
Foren...
Aug 11, 20251.8KViews
4likes
1Comment
From memory dumps to filesystem browsing
Historically, threat groups like Lorenz have relied on tools such as Magnet RAM Capture to dump volatile memory for offline analysis. While this approach ca...
Aug 05, 2025803Views
2likes
0Comments
Co-authors: Henry Yan, Sr. Product Marketing Manager and Sylvie Liu, Principal Product Manager
Security Operations Centers (SOCs) are under extreme pressure due to a rapidly evolving threat lan...
Aug 04, 20253KViews
3likes
0Comments
5 MIN READ
Co-authors - Ateesh Rajak - Balaji Venkatesh
Overview:
What if an attacker didn’t need malware, phishing kits, or exploits to break into your environment—just a convincing voice and a tool you ...
Jul 18, 2025671Views
1like
0Comments
Resources
Tags
- defender experts for xdr37 Topics
- defender experts for hunting29 Topics
- microsoft incident response (ir)22 Topics
- Industry Expert Series9 Topics