Hunting for Emerging Threats Before They Strike
Threat hunting has always been part science, part instinct. In the latest episode of Inside Microsoft Threat Intelligence, we follow Senior Security Researcher Thomas Ball on our Defender Experts for XDR (DEX) team as he traces a phishing campaign that hijacked Quick Assist—a legitimate Windows tool—to compromise organizations in unexpected ways. His investigation shows how modern defenders work ahead of detections, pulling threads until the full picture emerges.
But today’s threat landscape moves at machine speed. Criminal groups operate like businesses and are rapidly iterating their tooling and techniques. Nation-states deploy precision campaigns that blur the line between espionage and disruption. And, adversaries are experimenting with AI themselves, crafting lures, evading detection, and scaling operations.
In our first episode of Inside Microsoft Threat Intelligence, we showed how Microsoft Threat Intelligence and the Digital Crimes Unit (DCU) disrupted Storm-1152’s massive fake account operation, showing how we turn intelligence into global action.
In episode two, we moved from disruption to response, revealing how calm leadership shapes the outcome of “worst day” security incidents.
Now to episode three, we turn to the hunters, those working behind the scenes to uncover emerging threats before attackers have a chance to strike.
To stay ahead of an AI accelerated threat landscape, Microsoft’s modern threat hunters are changing their approaches too. They’re combining human intuition with AI-powered insight to proactively uncover the unknown.
Follow Microsoft Security