April 22, 2026

Detection strategies across cloud and identities against infiltrating IT workers

In this article Attack chain overview Activities in pre-recruitment phase Activities in recruiting phase Activities in post-recruitment phase Mitigation and protection guidance Microsoft Defender XDR detections […]
April 17, 2026

Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise

In this article Sapphire Sleet’s campaign lifecycle Defending against Sapphire Sleet intrusion activity Microsoft Defender detection and hunting guidance Indicators of compromise Executive summary Microsoft Threat […]