29 Agosto 2024
Catch up on changes and comments from others

(Originally published on December 14, 2023 by Rubba Ashwas, Scott McFadden, and Manon Knoertzer)   Hi, Microsoft 365 Insiders! Our[…]

Read More
28 Agosto 2024
The art and science behind Microsoft threat hunting: Part 3

Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined the strategies, methodologies, and approaches[…]

Read More
28 Agosto 2024
The art and science behind Microsoft threat hunting: Part 3

Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined the strategies, methodologies, and approaches[…]

Read More
28 Agosto 2024
The art and science behind Microsoft threat hunting: Part 3

Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined the strategies, methodologies, and approaches[…]

Read More
28 Agosto 2024
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which[…]

Read More
28 Agosto 2024
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which[…]

Read More