Also hear from Snow, co-founder of the Social Engineering Community Village at DEF CON, who shares her journey from special effects makeup to elite social engineer. Learn more about how organizations of any size can build resilience against evolving threats.
08.08.2025 16:13 โ ๐ 3 ๐ 0 ๐ฌ 0 ๐ 0
In this Microsoft Threat Intelligence Podcast episode, hosted by Sherrod DeGrippo, Microsoft's own Aarti Borkar, Simeon Kakpovi, and Andrew Rapp discuss how timely threat intel, rapid attacker analysis, and clear risk communication help orgs make informed decisions during security incidents.
08.08.2025 16:13 โ ๐ 3 ๐ 0 ๐ฌ 1 ๐ 0
Per Andrew Rapp, โdata is everything. Information is informing all of our decisions from where we go investigate, as well as the tactical containment steps weโre going to immediately take." This approach enables teams to respond efficiently and help customers recover quickly.
08.08.2025 16:12 โ ๐ 2 ๐ 0 ๐ฌ 1 ๐ 0
How Microsoft Stays Ahead of the Worldโs Most Dangerous Hackers
In this episode of the Microsoft Threat Intelligence Podcast, hostโ โ โ โ Sherrod DeGrippoโ is joined by Aarti Borkar, Simeon Kakpovi, and Andrew Rapp for a behind-the-scenes look at how Microsoft Threat Intelligence and Microsoft Incident Response teams collaborate as part of a closed-loop system, the emotional toll of breaches, and how organizations of any size can build resilience through preparation and psychological safety. By listening to this segment, youโll get a preview of what this group brought to the main stage of Black Hat this year.
Later, Sherrod chats with Snow, co-founder of the Social Engineering Community Village at DEF CON, about her journey from special effects makeup to elite social engineer, and how empathy, creativity, and even a ladder can be powerful tools in physical security testing.
Real-time collaboration between incident response and threat intelligence teams is critical for mounting an effective defense against todayโs cyber threats. The process relies on actionable intel to guide every step, from initial investigation to containment. msft.it/63322sOR1I
08.08.2025 16:08 โ ๐ 6 ๐ 1 ๐ฌ 1 ๐ 0
Project Ire emerged from a collaboration between @msftresearch.bsky.social, Microsoft Defender Research, and Microsoft Discovery & Quantum, bringing together security expertise, operational knowledge, global malware telemetry, and AI research.
05.08.2025 21:48 โ ๐ 3 ๐ 0 ๐ฌ 0 ๐ 0
To identify malware at scale, Project Ire uses specialized tools to reverse engineer software, with an architecture that allows for reasoning at multiple levels, from low-level binary analysis to control flow reconstruction and high-level interpretation of code behavior.
05.08.2025 21:45 โ ๐ 2 ๐ 0 ๐ฌ 1 ๐ 0
As a result, diplomatic personnel using local ISP or telecommunications services in Russia are highly likely targets of Secret Blizzardโs AiTM position. Get guidance for how orgs can defend against this campaign along with indicators of compromise (IOCs) and detection details in our blog post.
31.07.2025 16:10 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0
While we previously assessed with low confidence that the actor conducts cyberespionage activities within Russian borders against foreign and domestic entities, this is the first confirmation of the actorโs ability to do so at the Internet Service Provider (ISP) level.
31.07.2025 16:07 โ ๐ 2 ๐ 0 ๐ฌ 1 ๐ 0
ApolloShadow installs a trusted root certificate, enabling Secret Blizzard to persist on diplomatic devices, likely for intelligence collection. This campaign, ongoing since 2024, poses high risk to embassies, diplomatic entities, & sensitive orgs operating in Moscow using local internet providers.
31.07.2025 16:07 โ ๐ 2 ๐ 0 ๐ฌ 1 ๐ 0
Have fun learning and connecting at Black Hat!
29.07.2025 17:24 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Finally, the Microsoft Threat Intelligence Podcast will be recording live from Black Hat, so watch for that episode. Meanwhile, listen to Black Hat NOC lead Grifter & Hacker Jeopardy host Lintile share insights and tips on exploring the hacker community: msft.it/6049synib
29.07.2025 17:24 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
In the briefing โBitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secretsโ Microsoft security researchers share how their research into attack surfaces led to hardening and further securing Windows Recovery Environment (WinRE). msft.it/6048syniw
29.07.2025 17:24 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
At our VIP Mixer, hosted by Microsoft Incident Response, you can connect with our threat intelligence, incident response, and Security Copilot teams, alongside peers from the security community. Register here: msft.it/6047syniZ
29.07.2025 17:24 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
At Booth 2246, expert meetups, live threat briefings, red teaming deep dives, and insiderโs view of real incident response provide attendees the opportunity to hear directly from Microsoft experts, ask questions, get a clearer view end-to-end security: msft.it/6043syniV
29.07.2025 17:24 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
Here are the ways you can interact with Microsoft at #BHUSA 2025:
On the main stage, Microsoft Threat Intelligence experts share behind-the-scenes insights in โUnmasking Cyber Villains: How Microsoft Stays Ahead of the World's Most Dangerous Hackersโ: msft.it/63322syXVM
29.07.2025 17:20 โ ๐ 3 ๐ 3 ๐ฌ 1 ๐ 0
After discovering the bypass technique, we disclosed our findings to Apple, and we thank the security team for their collaboration in addressing this issue. Learn more about the implications of Sploitlight, our exploit, and how to strengthen defenses against TCC bypass attacks.
28.07.2025 16:04 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
The vulnerability, referred to as โSploitlightโ, enables extraction of sensitive data, such as precise geolocation info, photo and video metadata, face and person recognition data, search history, and moreโwhich is further complicated by the remote linking capabilities between iCloud accounts.
28.07.2025 16:03 โ ๐ 4 ๐ 4 ๐ฌ 1 ๐ 0
MDTI is Converging into Microsoft Sentinel and Defender XDR | Microsoft Community Hub
In todayโs rapidly evolving threat landscape, organizations need threat intelligence (TI) that is woven seamlessly into every step of their security...
Microsoft Defender Threat Intelligence (MDTI) is converging directly into Defender XDR and Microsoft Sentinel, providing real-time TI within a unified SecOps experience and granting customers access to Microsoftโs extensive repository of raw & finished threat intelligence: msft.it/6045sGrP9
25.07.2025 22:27 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Tune in to hear how Microsoft and its partners are raising the cost for attackers, pushing them further to the periphery. Learn more about Lumma Stealer: msft.it/63325sGHrB
25.07.2025 17:07 โ ๐ 3 ๐ 0 ๐ฌ 0 ๐ 0
In this Microsoft Threat Intelligence podcast episode, Richard Boscovich and Derek Richardson from Microsoftโs DCU share the creative legal strategies, global partnerships, and rapid collaboration with infrastructure providers that drove the operationโs success.
25.07.2025 17:04 โ ๐ 3 ๐ 0 ๐ฌ 1 ๐ 0
Inside Microsoftโs Global Operation to Disrupt Lumma Stealerโs 2,300-Domain Malware Network
In this episode of the Microsoft Threat Intelligence Podcast, hostโ โ โ โ Sherrod DeGrippoโ is joined by Richard Boscovich and Derek Richardson from Microsoftโs Digital Crimes Unit to unpack the global takedown of Lumma Stealer, one of the worldโs largest infostealer malware operations. They discuss how creative legal tools like RICO and centuries-old trespass laws, deep collaboration with global partners, and innovative technical strategies came together to seize 2,300 domains and protect nearly 400,000 victims. The episode explores how the DCU is shifting toward persistent, cost-imposing disruption of cybercrime as a service, and what this means for defenders everywhere.
Microsoftโs Digital Crimes Unit (DCU) shares the insider story of the successful global takedown of Lumma Stealerโa stealthy, customizable malware that quietly infected nearly 400,000 Windows devices worldwide, stealing passwords and sensitive data. msft.it/63325sGHE7
25.07.2025 17:01 โ ๐ 6 ๐ 4 ๐ฌ 2 ๐ 0
Customers should apply the on-premises SharePoint Server security updates immediately and follow the detailed mitigation guidance in the blog. The latest updates include additional TTPs of the new activity, additional IOCs, and expanded mitigation, protection, and hunting guidance.
24.07.2025 01:14 โ ๐ 5 ๐ 1 ๐ฌ 0 ๐ 0
Microsoft assesses that threat actors will continue to integrate the exploits into their attacks against unpatched on-premises SharePoint systems. Customers should apply the updates immediately to ensure they are protected.
22.07.2025 13:11 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
Official Bluesky page of the 780th Military Intelligence Brigade (Cyber). The Army's only offensive cyberspace operations brigade (following, re-posts, and links โ endorsement).
Writer for WIRED. Author of SANDWORM. New book, TRACERS IN THE DARK: The Global Hunt for the Crime Lords of Cryptocurrency, out now. agreenberg@wired.com. Andy.01 on Signal.
cybersecurity reporter for The Record.
formerly: zdnet, techrepublic, blavity, haitian times, cambodia daily
โ send tips to jonathangreig11@protonmail.com or signal: jgreig.51
@gregotto from twitter, now on bluesky. Editor-in-Chief at CyberScoop. Host of Safe Mode. Better with words than I am with code.
Cybersecurity reporter at Bloomberg News in DC. Signal: @howelloneill.01, email: patoneill1@bloomberg.net
Covering the world of cyber and intelligence from every angle.
The world's premier Technical Cybersecurity Conference Series
One of the most widely read and trusted cybersecurity news sites, providing IT security professionals informed insights into the latest news and trends.
CYBERWARCON is a one-day conference in Arlington, VA focused on the specter of destruction, disruption, and malicious influence on our society through cyber capabilities.
cyberwarcon.com
I work on the Windows engineering team at Microsoft and help with feedback for Start menu, Settings, taskbar, input + more
You can find me on most of the other social media apps including Twitter and reddit with the same account name @jenmsft
Cybersecurity reporter, CNN. Signal +1-202-355-8471 or SNLyng.11. sean[dot]lyngaas@cnn[dot]com
Original news, reviews, analysis of tech trends, and expert advice on the most fundamental aspects of tech.
Security information portal, testing and certification body.
Organisers of the annual Virus Bulletin conference.
https://www.sleuthcon.com
Connecting police & catching criminals in 196 countries for more than a century. ๐ต๏ธ
Follow our success stories here. ๐ฎโโ๏ธ๐๐ฎโโ๏ธ
โ๏ธ Report crimes to your local police.
Security editor, TechCrunch
Signal: zackwhittaker.1337
My stories: techcrunch.com/author/zack-whittaker
My weekly cyber newsletter: this.weekinsecurity.com
now available as a browser extension
Threat Hunting & DFIR, Hacker, Geek, DEF CON & Black Hat CFP Review Board Member, DEF CON Contest/Events/Demo Labs Dept. Head, Black Hat Staff, DC801 Founder
At wired.com where tomorrow is realized || Sign up for our newsletters: https://wrd.cm/newsletters
Find our WIRED journalists here: https://bsky.app/starter-pack/couts.bsky.social/3l6vez3xaus27