MsftSecIntel Profile Banner
Microsoft Threat Intelligence Profile
Microsoft Threat Intelligence

@MsftSecIntel

Followers
187K
Following
2K
Media
712
Statuses
6K

We are Microsoft's global network of security experts. Follow for security research and threat intelligence.

Redmond, WA
Joined November 2010
Don't wanna be here? Send us removal request.
@MsftSecIntel
Microsoft Threat Intelligence
3 days
Over the past year, Microsoft Threat Intelligence and Microsoft Defender Experts have observed the ClickFix social engineering technique growing in popularity, with campaigns targeting thousands of enterprise and end-user devices daily. This technique.
Tweet card summary image
microsoft.com
The ClickFix social engineering technique has been growing in popularity, with campaigns targeting thousands of enterprise and end-user devices daily. This technique exploits users’ tendency to...
2
66
160
@MsftSecIntel
Microsoft Threat Intelligence
6 days
PipeMagic is a sophisticated malware framework with a modular, stealthy, and highly extensible architecture, giving threat actors granular control over code execution and making detection and analysis challenging. . Microsoft Threat Intelligence has.
Tweet card summary image
microsoft.com
A comprehensive technical deep dive on PipeMagic, a highly modular backdoor used by Storm-2460 masquerading as a legitimate open-source ChatGPT Desktop Application. Beneath its disguise, PipeMagic is...
3
70
205
@grok
Grok
5 days
What do you want to know?.
319
192
1K
@MsftSecIntel
Microsoft Threat Intelligence
12 days
The August 2025 security updates are available:.
@msftsecresponse
Microsoft Security Response Center
12 days
Security updates for August 2025 are now available! Details are here: #PatchTuesday #SecurityUpdateGuide
Tweet media one
1
18
57
@MsftSecIntel
Microsoft Threat Intelligence
16 days
@sherrod_im Also hear from Snow, co-founder of the Social Engineering Community Village at DEF CON, who shares her journey from special effects makeup to elite social engineer. Learn more about how organizations of any size can build resilience against evolving threats.
2
3
11
@MsftSecIntel
Microsoft Threat Intelligence
16 days
In this Microsoft Threat Intelligence Podcast episode, hosted by @sherrod_im, Aarti Borkar, Simeon Kakpovi, and Andrew Rapp discuss how timely threat intel, rapid attacker analysis, and clear risk communication help organizations make informed decisions during security incidents.
2
2
12
@MsftSecIntel
Microsoft Threat Intelligence
16 days
Per Andrew Rapp, “data is everything. Information is informing all of our decisions from where we go investigate, as well as the tactical containment steps we’re going to immediately take." This approach enables teams to respond efficiently and help customers recover quickly.
1
2
8
@MsftSecIntel
Microsoft Threat Intelligence
16 days
Real-time collaboration between incident response and threat intelligence teams is critical for mounting an effective defense against today’s cyber threats. The process relies on actionable intel to guide every step, from initial investigation to containment.
2
21
100
@MsftSecIntel
Microsoft Threat Intelligence
19 days
Project Ire, an autonomous AI agent, automates what’s considered the gold standard in malware classification: fully reverse engineering a software file without any clues about its origin or purpose: . To identify malware at scale, Project Ire uses.
Tweet card summary image
microsoft.com
Designed to classify software without context, Project Ire replicates the gold standard in malware analysis through reverse engineering. It streamlines a complex, expert-driven process, making...
5
74
215
@MsftSecIntel
Microsoft Threat Intelligence
19 days
RT @msftsecresponse: Microsoft’s Zero Day Quest is back and bigger than ever. Last year, we launched the largest public hacking event in hi….
0
33
0
@MsftSecIntel
Microsoft Threat Intelligence
24 days
As a result, diplomatic personnel using local ISP or telecommunications services in Russia are highly likely targets of Secret Blizzard. Get guidance for how orgs can defend against this campaign along with indicators of compromise (IOCs) and detection details in our blog post.
1
2
22
@MsftSecIntel
Microsoft Threat Intelligence
24 days
While we previously assessed with low confidence that the actor conducts cyberespionage activities within Russian borders against foreign and domestic entities, this is the first confirmation of the actor’s ability to do so at the Internet Service Provider (ISP) level.
1
2
17
@MsftSecIntel
Microsoft Threat Intelligence
24 days
ApolloShadow installs a trusted root certificate, letting Secret Blizzard persist on diplomatic devices, likely for intelligence collection. This campaign, ongoing since 2024, poses high risk to embassies and sensitive groups operating in Moscow using local internet providers.
1
2
12
@MsftSecIntel
Microsoft Threat Intelligence
24 days
Microsoft Threat Intelligence has uncovered a cyberespionage campaign by the Russian state actor we track as Secret Blizzard targeting embassies in Moscow using an adversary-in-the-middle (AiTM) position to deploy their custom ApolloShadow malware.
Tweet card summary image
microsoft.com
Microsoft Threat Intelligence has uncovered a cyberespionage campaign by the Russian state actor we track as Secret Blizzard that has been ongoing since at least 2024, targeting embassies in Moscow...
3
74
188
@MsftSecIntel
Microsoft Threat Intelligence
24 days
RT @msftsecresponse: As enterprises adopt large language models (LLMs), a new class of threats has emerged: indirect prompt injection. Thi….
0
21
0
@MsftSecIntel
Microsoft Threat Intelligence
26 days
Have fun learning and connecting at Black Hat!.
0
1
8
@MsftSecIntel
Microsoft Threat Intelligence
26 days
Finally, the Microsoft Threat Intelligence Podcast will be recording live from Black Hat, so watch for that episode. Meanwhile, listen to Black Hat NOC lead Grifter & Hacker Jeopardy host Lintile share insights and tips on exploring the hacker community:
Tweet card summary image
thecyberwire.com
In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠⁠Sherrod DeGrippo⁠ is joined by Grifter, the legendary Black Hat NOC lead, and Lintile, host of Hacker Jeopardy, to go behind the...
1
1
8
@MsftSecIntel
Microsoft Threat Intelligence
26 days
In the briefing “BitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secrets” Microsoft security researchers share how their research into attack surfaces led to hardening and further securing Windows Recovery Environment (WinRE).
1
1
6
@MsftSecIntel
Microsoft Threat Intelligence
26 days
At our VIP Mixer, hosted by Microsoft Incident Response, you can connect with our threat intelligence, incident response, and Security Copilot teams, alongside peers from the security community. Register here:
1
0
4
@MsftSecIntel
Microsoft Threat Intelligence
26 days
At Booth 2246, expert meetups, live threat briefings, red teaming deep dives, and insider’s view of real incident response provide attendees the opportunity to hear directly from Microsoft experts, ask questions, get a clearer view end-to-end security:
Tweet card summary image
techcommunity.microsoft.com
Microsoft will be at Black Hat USA 2025, August 5–7 in Las Vegas, and we’re bringing you a unified, practitioner-driven experience built around...
1
0
3
@MsftSecIntel
Microsoft Threat Intelligence
26 days
Here are the ways you can interact with Microsoft at #BHUSA 2025:. On the main stage, Microsoft Threat Intelligence experts share behind-the-scenes insights in “Unmasking Cyber Villains: How Microsoft Stays Ahead of the World's Most Dangerous Hackers”:
3
3
19