MsftSecIntel Profile Banner
Microsoft Threat Intelligence Profile
Microsoft Threat Intelligence

@MsftSecIntel

Followers
188K
Following
2K
Media
721
Statuses
6K

We are Microsoft's global network of security experts. Follow for security research and threat intelligence.

Redmond, WA
Joined November 2010
Don't wanna be here? Send us removal request.
@MsftSecIntel
Microsoft Threat Intelligence
2 days
New blog post: Shai-Hulud 2.0: Guidance for detecting, investigating, and defending against the supply chain attack. https://t.co/R41QPav8mO In defending against threats like Shai-Hulud 2.0, organizations benefit significantly from the layered protection from Microsoft Defender,
Tweet card summary image
microsoft.com
The Shai‑Hulud 2.0 supply chain attack represents one of the most significant cloud-native ecosystem compromises observed recently. Attackers maliciously modified hundreds of publicly available...
2
22
54
@MsftSecIntel
Microsoft Threat Intelligence
2 days
The December 2025 security updates are available:
@msftsecresponse
Microsoft Security Response Center
2 days
Security updates for December 2025 are now available. Details are here: https://t.co/WW89TchdN8 #PatchTuesday #SecurityUpdateGuide
1
20
43
@MsftSecIntel
Microsoft Threat Intelligence
8 days
"Defense is doable… We have to be brilliant at the basics... It’s about doing really good access management, really good principle of least privilege, really good network architecture..." -- Matt Duncan, E-ISAC VP of Security Operations and Intelligence
Tweet card summary image
thecyberwire.com
In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠⁠Sherrod DeGrippo⁠ is joined by Matt Duncan, Vice President of Security Operations and Intelligence at the North American...
0
4
22
@MsftSecIntel
Microsoft Threat Intelligence
10 days
Like similar Storm-0900 activity, this campaign led to XWorm, a popular modular malware used by many threat actors for remote access, deployment of other malware, and data theft. XWorm uses plugins that threat actors can use to perform various tasks on compromised devices. These
1
5
14
@MsftSecIntel
Microsoft Threat Intelligence
10 days
The URLs in the phishing emails redirected to an attacker-controlled landing page on the malicious domain permit-service[.]top that employed several rounds of user interaction. First, users needed to solve a slider CAPTCHA by clicking and dragging a slider, followed by ClickFix,
3
5
16
@MsftSecIntel
Microsoft Threat Intelligence
10 days
On Thanksgiving eve, November 26, Microsoft detected and blocked a high-volume phishing campaign from a threat actor we track as Storm-0900. The campaign used parking ticket and medical test result themes and referenced Thanksgiving to lend credibility and lower recipients’
2
40
157
@MsftSecIntel
Microsoft Threat Intelligence
20 days
Throughout 2025, Tycoon2FA (tracked by Microsoft as Storm-1747) has consistently been the most prolific phishing-as-a-service (PhaaS) platform observed by Microsoft. In October 2025, Microsoft Defender for Office 365 blocked more than 13 million malicious emails linked to
3
39
124
@MsftSecIntel
Microsoft Threat Intelligence
21 days
For more details and practical guidance, tune in to this Microsoft Threat Intelligence Podcast episode hosted by Sherrod DeGrippo, featuring insights from Anna Seitz and Tori Murphy.
0
1
4
@MsftSecIntel
Microsoft Threat Intelligence
21 days
Vanilla Tempest, another financially motivated group, used SEO poisoning to distribute fake, fraudulently signed Teams installers to deliver ransomware. Their TTPs include abusing code signing, opportunistic targeting, & exploiting known vulnerabilities.
1
1
4
@MsftSecIntel
Microsoft Threat Intelligence
21 days
The Storm-2657 “payroll pirate” campaign targeted universities by exploiting compromised email accounts and weak MFA protocols, using phishing emails to steal credentials and reroute salary payments.
Tweet card summary image
microsoft.com
Microsoft Threat Intelligence has identified a financially motivated threat actor that we track as Storm-2657 compromising employee accounts to gain unauthorized access to employee profiles and...
1
1
1
@MsftSecIntel
Microsoft Threat Intelligence
23 days
The Threat Intelligence Briefing Agent, which delivers daily customized briefings that combine Microsoft’s global threat intelligence with insights specific to each organization, is now fully integrated into the Microsoft Defender portal, available in public preview.
8
38
193
@MsftSecIntel
Microsoft Threat Intelligence
23 days
And to make it easier than ever for organizations to harness the power of Security Copilot agents to protect at the speed and scale of AI, Security Copilot will be included for all Microsoft 365 E5 customers. Learn more:
Tweet card summary image
learn.microsoft.com
Learn about Security Copilot availability in Microsoft 365 (ME5)
0
2
7
@MsftSecIntel
Microsoft Threat Intelligence
23 days
These adaptive agents run side by side with security teams to triage incidents, optimize conditional access policies, surface threat intelligence, and maintain secure, compliant endpoints more easily.
Tweet card summary image
learn.microsoft.com
Learn about Microsoft Security Copilot agents.
1
2
5
@MsftSecIntel
Microsoft Threat Intelligence
23 days
Microsoft is introducing a dozen new and enhanced Microsoft Security Copilot agents in Microsoft Defender, Microsoft Entra, Microsoft Intune, & Microsoft Purview. Our partner community also released more than 30 new Security Copilot agents.
Tweet card summary image
microsoft.com
At Microsoft Ignite 2025, we are not just announcing new features—we are redefining what’s possible, empowering security teams to shift from reactive responses to proactive strategies.
2
4
26
@MsftSecIntel
Microsoft Threat Intelligence
1 month
The November 2025 security updates are available:
@msftsecresponse
Microsoft Security Response Center
1 month
Security updates for November 2025 are now available! Details are here: https://t.co/WW89TcgFXA #PatchTuesday #SecurityUpdateGuide
2
21
55
@MsftSecIntel
Microsoft Threat Intelligence
1 month
Microsoft has discovered a new type of side-channel attack against streaming-mode language models using network packet sizes and timings. https://t.co/HAa7IYyhHR An attacker in a position to observe the encrypted traffic could use this type of side-channel attack to conclude
Tweet card summary image
microsoft.com
Understand the risks of encrypted AI traffic exposure and explore practical steps users and cloud providers can take to stay secure. Learn more.
0
31
87
@MsftSecIntel
Microsoft Threat Intelligence
1 month
Dive into the heart of threat intelligence as Principal Security Researcher @yo_yo_yo_jbo reveals how proactive security research powers Microsoft’s defenses: https://t.co/VgoMyoiCgJ. The relentless hunt for vulnerabilities—like the HM Surf exploit—spotlights how research doesn’t
0
6
40
@MsftSecIntel
Microsoft Threat Intelligence
1 month
In the latest Microsoft Threat Intelligence Podcast episode, Sherrod DeGrippo and Zack Korman explore the future risks and opportunities that AI introduces in cybersecurity, cutting through hype to discuss where AI is both brilliant and flawed:
Tweet card summary image
thecyberwire.com
In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠⁠Sherrod DeGrippo⁠ is joined by ⁠Zack Korman⁠, CTO of cybersecurity startup Pistachio. They explore the reality of AI in securi...
1
18
45
@MsftSecIntel
Microsoft Threat Intelligence
1 month
Microsoft Incident Response – Detection and Response Team (DART) uncovered SesameOp, a new backdoor that uses the OpenAI Assistants API for C2. DART shared the findings with OpenAI, who identified and disabled an API key and associated account. https://t.co/xflPrSQReI SesameOp
Tweet card summary image
microsoft.com
Microsoft Incident Response – Detection and Response Team (DART) researchers uncovered a new backdoor that is notable for its novel use of the OpenAI Assistants Application Programming Interface...
5
63
193