Elliot's Avatar

Elliot

@journalizer.bsky.social

Director for Microsoft Threat Intelligence. I only post about cybersecurity and raising chickens.

349 Followers  |  237 Following  |  63 Posts  |  Joined: 03.07.2023  |  2.2782

Latest posts by journalizer.bsky.social on Bluesky

Preview
Analysis of active exploitation of SolarWinds Web Help Desk | Microsoft Security Blog We are seeing exploitation of SolarWinds Web Help Desk via CVE‑2025‑40551 and CVE‑2025‑40536 that can lead to domain compromise; here is how to patch, hunt, and mitigate now.

Fresh IOCs and intel - Our team has identified an active campaign exploiting items associated with two CVEs tied to SolarWinds Web Help Desk (CVE‑2025‑40551 and CVE‑2025‑40536). www.microsoft.com/en-us/securi...

07.02.2026 13:48 — 👍 0    🔁 0    💬 0    📌 0
The Jekyll and Hyde code in openclaw

The Jekyll and Hyde code in openclaw

Just so you know, #openclaw contains a schedule-sensitive prompt injection hook called “soul-evil.ts” During “purge time,” it may randomly replace the system prompt with the contents of a “SOUL_EVIL.md” file

04.02.2026 00:29 — 👍 131    🔁 47    💬 19    📌 23
Preview
Turning threat reports into detection insights with AI | Microsoft Security Blog Security teams often spend days manually turning long incident reports and threat writeups into actionable detections by extracting TTPs. This blog post shows an AI-assisted workflow that does the sam...

And here is a solid piece for security engineers on using AI to turn threat reports into detections www.microsoft.com/en-us/securi...

04.02.2026 00:12 — 👍 0    🔁 0    💬 0    📌 0
Preview
Infostealers without borders: macOS, Python stealers, and platform abuse | Microsoft Security Blog How modern infostealers target macOS systems, leverage Python‑based stealers, and abuse trusted platforms and utilities to distribute credential‑stealing payloads.

Latest from our team on infostealers www.microsoft.com/en-us/securi...

04.02.2026 00:11 — 👍 0    🔁 0    💬 1    📌 0
Post image Post image Post image

Well, it is once again snowing in Charleston, a place it’s not really supposed to snow. Chicks don’t seem to mind.

31.01.2026 22:02 — 👍 0    🔁 0    💬 0    📌 0

Parent status:
Bluey 👍
Bebe Finn 👎🏻

29.01.2026 13:08 — 👍 0    🔁 0    💬 0    📌 0
Preview
Fact vs Hype: How Threat Actors Are Really Using AI Right Now In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠⁠Sherrod DeGrippo⁠ is joined by security researcher Crane Hassold and Digital Defense Report lead Chloe Mesdaghi for a grounded, practitioner-led discussion on where artificial intelligence actually stands today. Moving beyond hype and fear-driven narratives, the conversation examines how AI is realistically being used by threat actors, where its impact is often overstated, and why defenders currently stand to gain the most from AI-driven tooling. The episode explores AI’s strengths in detection, triage, and workflow acceleration, the psychology and incentives that shape attacker behavior, and emerging risks such as prompt injection and AI systems becoming direct attack targets.

This special “AI hot takes” episode of the Microsoft Threat Intelligence Podcast explores where AI truly stands today, how it’s shaping cyber operations, and what security practitioners and threat intelligence analysts need to know and consider: msft.it/63324QGWWy

28.01.2026 17:41 — 👍 6    🔁 3    💬 1    📌 0
Preview
A new era of agents, a new era of posture  | Microsoft Security Blog AI agents are transforming how organizations operate, but their autonomy also expands the attack surface.

And unfortunately I take full responsibility for these terrible stock images until I can find something more suitable. www.microsoft.com/en-us/securi...

24.01.2026 20:05 — 👍 2    🔁 0    💬 0    📌 0
Preview
From runtime risk to real‑time defense: Securing AI agents  | Microsoft Security Blog Why securing AI agents at runtime is essential as attackers find new ways to exploit generative orchestration.

In addition to active campaigns we are sharing guidance on how to secure everything from emerging technology like AI, agents, and impact from quantum www.microsoft.com/en-us/securi...

24.01.2026 20:02 — 👍 2    🔁 0    💬 1    📌 0
Preview
Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint  | Microsoft Security Blog Microsoft Defender Researchers uncovered a multi‑stage AiTM phishing and business email compromise (BEC) campaign targeting multiple organizations in the energy sector.

This week Microsoft Threat Intelligence launched a new hub for threat insights and to research. Our goal is to ensure active campaigns get the necessary attention and mitigation steps out as broadly as possible.

www.microsoft.com/en-us/securi...

24.01.2026 19:59 — 👍 1    🔁 0    💬 1    📌 0
Preview
Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint  | Microsoft Security Blog Microsoft Defender Researchers uncovered a multi‑stage AiTM phishing and business email compromise (BEC) campaign targeting multiple organizations in the energy sector.

Just published from Microsoft Security - newly observed campaign and detections aka.ms/aitm-bec

22.01.2026 05:28 — 👍 2    🔁 0    💬 0    📌 0
Post image

Searching for breakfast

16.12.2025 13:37 — 👍 1    🔁 0    💬 0    📌 0
Video thumbnail

Pretty sure this means the copilot mascot, Mico, is actually Clippy.

Just tap it a few times on the consumer version of the app and you’ll find him.

07.12.2025 23:53 — 👍 1    🔁 0    💬 0    📌 0

Beyond immediate containment, Microsoft IR supports recovery, future planning, and building long-term resilience. According to Adrian Hill, lead investigator for Microsoft IR, “The customer needs to be successful. The only way to do that is to ensure that everyone is successful.”

01.10.2025 19:34 — 👍 0    🔁 1    💬 0    📌 0

By leading with empathy and collaboration, Microsoft IR unites vendors and internal teams to stabilize crises and uncover hidden threats, ensuring unified action. This approach means that every engagement restores the customer and simultaneously strengthens the broader security ecosystem.

01.10.2025 19:33 — 👍 0    🔁 1    💬 1    📌 0
Video thumbnail

The nature of incident response is its chaos, and the second chapter of our four-part Inside Microsoft Threat Intelligence miniseries displays how Microsoft’s IR team thrives amid disorder, stepping in when environments are compromised and confidence is shaken: msft.it/63322svfky

01.10.2025 19:29 — 👍 5    🔁 2    💬 2    📌 0
Video thumbnail

"Microsoft Threat Intelligence is fully focused on disrupting threat actor activity."

The first of a four-part Inside Microsoft Threat Intelligence miniseries gives behind-the-scenes look at how Microsoft's Digital Crimes Unit disrupted Storm-1152: msft.it/63327sWnGF

17.09.2025 22:38 — 👍 4    🔁 1    💬 1    📌 0
From Insight to Disruption | Security Insider How Microsoft disrupted Storm-1152’s 750 million fake accounts. See how threat intelligence becomes action, disruption, and protection.

Full episode here www.microsoft.com/en-us/securi...

17.09.2025 14:08 — 👍 0    🔁 0    💬 0    📌 0

Each episode will offer an inside look at Microsoft Security's threat intelligence capability that is designed to reduce risk, improve resilience, and empower security teams across the globe.

17.09.2025 14:08 — 👍 0    🔁 0    💬 1    📌 0

This week we are releasing episode one of Inside Microsoft Threat Intelligence, a new series highlighting the power of our 10,000-strong security team.

17.09.2025 14:08 — 👍 0    🔁 0    💬 1    📌 0
Video thumbnail

The world of cybercrime is becoming commercialized, mercenaries for hire if you will, but Microsoft Threat Intelligence and our Digital Crimes Unit use intel to disrupt their actions.

17.09.2025 14:07 — 👍 4    🔁 1    💬 1    📌 0
Preview
The Rise of AI-Powered Interview Cheating From astroturfing Reddit to evading anti-cheating tools, InterviewHammer exposes a darker side of AI in hiring

Spidey senses ever go off during a remote interview with a candidate that they may be getting some AI assistance? Unfortunately there are new tools that make this even easier www.adoptingzerotrust.com/p/the-rise-o...

22.08.2025 15:08 — 👍 1    🔁 0    💬 0    📌 0
Video thumbnail

Yesterday at Black Hat we had an awesome lineup of experts ranging from Tom Gallagher, Travis Schack, Kendra Cooley, and Sherrod DeGrippo.

Going for round two, and having MSRC’s podcast takeover, Blain Hailemariam running KC7, and I’ll be moderating a few chats in between.

07.08.2025 13:40 — 👍 1    🔁 0    💬 0    📌 0
Video thumbnail

Kicked off our series of podcasts and interviews here at Black Hat. Come on by booth 2246.

06.08.2025 17:17 — 👍 0    🔁 0    💬 0    📌 0

Customers should apply the on-premises SharePoint Server security updates immediately and follow the detailed mitigation guidance in the blog. The latest updates include additional TTPs of the new activity, additional IOCs, and expanded mitigation, protection, and hunting guidance.

24.07.2025 01:14 — 👍 5    🔁 1    💬 0    📌 0
Preview
Disrupting active exploitation of on-premises SharePoint vulnerabilities | Microsoft Security Blog Microsoft has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon, exploiting vulnerabilities targeting internet-facing SharePoint servers. In addition, we have observed another China-based threat actor, tracked as Storm-2603, exploiting these vulnerabilities. Microsoft has released new comprehensive security updates for all supported versions of SharePoint Server (Subscription Edition, 2019, and 2016) that protect customers against these new vulnerabilities. Customers should apply these updates immediately to ensure they are protected.

We updated our blog with expanded analysis and threat intelligence from newly observed activity by Storm-2603 leading to the deployment of Warlock ransomware. msft.it/63320s134O

24.07.2025 01:12 — 👍 7    🔁 4    💬 1    📌 0
Video thumbnail

Knockout Tour is the best

18.06.2025 01:26 — 👍 0    🔁 0    💬 0    📌 0
Preview
Announcing a new strategic collaboration to bring clarity to threat actor naming | Microsoft Security Blog Microsoft and CrowdStrike are teaming up to create alignment across our individual threat actor taxonomies to help security professionals connect insights faster.

Microsoft and CrowdStrike are teaming up to create alignment across our threat actor taxonomies, mapping where knowledge of these actors align to enable security professionals to connect insights faster and make decisions with greater confidence. https://msft.it/63327SlOeJ

02.06.2025 16:18 — 👍 11    🔁 6    💬 2    📌 6
Post image

Always bribe your audience with candy

01.05.2025 20:50 — 👍 0    🔁 0    💬 0    📌 0
Post image

Spot me at RSAC next week for w bootleg sticker

24.04.2025 14:34 — 👍 0    🔁 0    💬 0    📌 0

@journalizer is following 20 prominent accounts