Recent Blogs
 Threats like password spray or adversary-in-the-middle (AiTM) are routine and too easily overlooked in an endless stream of security alerts. But what if these routine threats are only a small part of...
Oct 27, 2025376Views
1like
0Comments
7 MIN READ
 In today’s rapidly evolving threat landscape, cybersecurity demands more than just great technology—it requires great teamwork. That’s the story behind the collaboration between Microsoft Defender Ex...
Sep 18, 2025333Views
0likes
0Comments
 Co-authors - Christoph Dreymann - Shiva P 
 Introduction 
 Azure Storage Accounts are frequently targeted by threat actors. Their goal is to exfiltrate sensitive data to an external infrastructure un...
Sep 02, 20253.4KViews
2likes
0Comments
 Co-authors - Raae Wolfram | Sam Gardener 
 Once an attacker has gained access to a system, the browser becomes a rich source of credentials, a platform for persistence, and a stealthy channel for dat...
Aug 25, 2025707Views
0likes
0Comments
 Updated August 11, 2025 
   
 Microsoft Defender Experts for XDR 
 Microsoft Defender Experts for XDR is a managed extended detection and response (MXDR) service that triages, investigates, and respo...
Aug 15, 2025680Views
1like
0Comments
 Microsoft Defender Experts manages and investigates incidents for some of the world’s largest organizations. We understand the challenges facing our customers and are always looking for ways to respo...
Aug 14, 2025441Views
3likes
0Comments
7 MIN READ
 Forensic readiness in the cloud 
 Forensic readiness in the cloud refers to an organization’s ability to collect, preserve, and analyze digital evidence in preparation for security incidents. 
 Foren...
Aug 11, 20251.8KViews
4likes
1Comment
 From memory dumps to filesystem browsing 
 Historically, threat groups like Lorenz have relied on tools such as Magnet RAM Capture to dump volatile memory for offline analysis. While this approach ca...
Aug 05, 2025803Views
2likes
0Comments
 Co-authors: Henry Yan, Sr. Product Marketing Manager and Sylvie Liu, Principal Product Manager 
   
 Security Operations Centers (SOCs) are under extreme pressure due to a rapidly evolving threat lan...
Aug 04, 20253KViews
3likes
0Comments
5 MIN READ
 Co-authors - Ateesh Rajak  -  Balaji Venkatesh 
 Overview: 
 What if an attacker didn’t need malware, phishing kits, or exploits to break into your environment—just a convincing voice and a tool you ...
Jul 18, 2025671Views
1like
0Comments
Resources
Tags
- defender experts for xdr37 Topics
- defender experts for hunting29 Topics
- microsoft incident response (ir)22 Topics
- Industry Expert Series9 Topics