April 10, 2026

Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees

In this article Storm-2755’s attack chain Defending against Storm-2755 and AiTM campaigns Microsoft Defender detection and hunting guidance Indicators of compromise Microsoft Incident Response – Detection […]
April 10, 2026

Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk

In this article Technical details Disclosure timeline Mitigation and protection guidance References Learn more During routine security research, we identified a severe intent redirection vulnerability in […]
April 8, 2026

SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks

In this article DNS hijacking attack chain: From compromised devices to AiTM and other follow-on activity Mitigation and protection guidance Microsoft Defender detection and hunting guidance […]
April 7, 2026

Inside an AI‑enabled device code phishing campaign

In this article Attack chain overview Mitigation and protection guidance Indicators of compromise (IOC) References Learn more Microsoft Defender Security Research has observed a widespread phishing […]
April 7, 2026

Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations

In this article Storm-1175’s rapid attack chain: From initial access to impact Mitigation and protection guidance Microsoft Defender detections Indicators of compromise The financially motivated cybercriminal […]
April 3, 2026

Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments

In this article Cookie-controlled execution behavior Observed variants of cookie-controlled PHP web shells Mitigation and protection guidance  Microsoft Defender XDR detections Microsoft Security Copilot prompts Microsoft Defender XDR […]
April 1, 2026

The threat to critical infrastructure has changed. Has your readiness?

Critical infrastructure (CI) organizations underpin national security, public safety, and the economy. In 2026, the cyber threat landscape facing these sectors is structurally different than it was even two […]
April 1, 2026

WhatsApp malware campaign delivers VBS payloads and MSI backdoors

In this article Attack chain overview Mitigation and protection guidance Hunting queries Indicators of compromise Microsoft Defender Experts (DEX) observed a campaign beginning in late February […]