Recent Blogs
Co-author: Samantha Gardener
To stay ahead of today’s sophisticated cyber threats, organizations must embrace a proactive defense strategy that includes these three pillars: emerging trends, adapti...
Dec 02, 2025694Views
0likes
0Comments
When threat actors infiltrate a company to steal documents and other critical business information, Microsoft Incident Response - the Detection and Response Team (DART) responds. With more than 4,500...
Nov 25, 2025338Views
0likes
0Comments
Co-authors:
Sylvie Liu, Principal Product Manager
Rajiv Bharadwaja, Principal Software Engineering Manager
Abhishek Kumar, Principal Group Manager - Security Research & Operations
Security ...
Nov 18, 20257.5KViews
4likes
0Comments
3 MIN READ
Many people aren’t aware that Microsoft security isn't just about Microsoft, it’s also about the platforms supporting the products we build. This means our reach extends across all operating systems:...
Nov 13, 2025143Views
0likes
0Comments
As organizations embed AI across their business, the same technology that drives productivity also introduces a new class of risk: prompts that can be manipulated, data that can be leaked, and AI sys...
Nov 11, 2025749Views
1like
0Comments
4 MIN READ
The cybersecurity threat landscape continues to evolve with novel attacks and techniques emerging each day. Microsoft Defender Experts for Hunting, included with Microsoft Defender Experts for XDR, h...
Nov 03, 2025396Views
3likes
0Comments
Threats like password spray or adversary-in-the-middle (AiTM) are routine and too easily overlooked in an endless stream of security alerts. But what if these routine threats are only a small part of...
Oct 27, 2025762Views
1like
0Comments
7 MIN READ
In today’s rapidly evolving threat landscape, cybersecurity demands more than just great technology—it requires great teamwork. That’s the story behind the collaboration between Microsoft Defender Ex...
Sep 18, 2025376Views
0likes
0Comments
Co-authors - Christoph Dreymann - Shiva P
Introduction
Azure Storage Accounts are frequently targeted by threat actors. Their goal is to exfiltrate sensitive data to an external infrastructure un...
Sep 02, 20253.6KViews
2likes
0Comments
Co-authors - Raae Wolfram | Sam Gardener
Once an attacker has gained access to a system, the browser becomes a rich source of credentials, a platform for persistence, and a stealthy channel for dat...
Aug 25, 2025821Views
0likes
0Comments
Resources
Tags
- defender experts for xdr41 Topics
- defender experts for hunting30 Topics
- microsoft incident response (ir)22 Topics
- Industry Expert Series9 Topics