Office VBA + AMSI: Parting the veil on malicious macros

Read more Office VBA + AMSI: Parting the veil on malicious macros

How Microsoft 365 Security integrates with your broader IT ecosystem—part 3

Read more How Microsoft 365 Security integrates with your broader IT ecosystem—part 3

How Microsoft 365 Security integrates with the broader security ecosystem—part 1

Read more How Microsoft 365 Security integrates with the broader security ecosystem—part 1

Hawkeye Keylogger – Reborn v8: An in-depth campaign analysis

Read more Hawkeye Keylogger – Reborn v8: An in-depth campaign analysis

Assessing Microsoft 365 security solutions using the NIST Cybersecurity Framework

Read more Assessing Microsoft 365 security solutions using the NIST Cybersecurity Framework

Taking apart a double zero-day sample discovered in joint hunt with ESET

Read more Taking apart a double zero-day sample discovered in joint hunt with ESET

Machine learning vs. social engineering

Read more Machine learning vs. social engineering

Securing the modern workplace with Microsoft 365 threat protection – part 4

Read more Securing the modern workplace with Microsoft 365 threat protection – part 4

Enhancing Office 365 Advanced Threat Protection with detonation-based heuristics and machine learning

Read more Enhancing Office 365 Advanced Threat Protection with detonation-based heuristics and machine learning

Securing the modern workplace with Microsoft 365 threat protection – part 3

Read more Securing the modern workplace with Microsoft 365 threat protection – part 3