{
	"id": "5dca38f0-f9d7-4569-8cae-2580cc412e3f",
	"created_at": "2026-04-10T03:22:11.186572Z",
	"updated_at": "2026-04-10T03:22:16.697602Z",
	"deleted_at": null,
	"sha1_hash": "85ea67fc685f34e1487c63195477d80264fa4e19",
	"title": "Microsoft Security Response Center Blog",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 49386,
	"plain_text": "Microsoft Security Response Center Blog\r\nArchived: 2026-04-10 02:38:47 UTC\r\nStrengthening secure software at global scale: How MSRC is evolving with AI\r\nTuesday, April 7, 2026\r\nCybersecurity has always been a race between defenders and attackers, constrained by human time, attention, and\r\nscale. What is changing now is the level of capability available to apply security fundamentals with far greater\r\nreach and speed. At\r\nRead More\r\nCongratulations to the top MSRC 2026 Q1 security researchers!\r\nMonday, April 6, 2026\r\nCongratulations to all the researchers recognized in this quarter’s Microsoft Researcher Recognition\r\nProgram leaderboard! Thank you to everyone for your hard work and continued partnership to secure customers.\r\nThe top three researchers of the 2026 Q1\r\nRead More\r\nThe research never stops: Zhiniang Peng’s security research story\r\nWednesday, March 4, 2026\r\nSome security researchers discover hacking early. Others discover it accidentally. For Zhiniang Peng, it started\r\nwith curiosity and cybersecurity magazines. Growing up in China, computers and the internet were already part of\r\ndaily life by the time\r\nRead More\r\nFrom arcades to Azure: Felix’s security research journey\r\nFriday, February 20, 2026\r\nWhen you talk with Felix, you quickly get the sense that he has always been propelled by curiosity and by a need\r\nfor something that truly challenges him. Today, he is a successful independent security researcher who\r\nuncovers vulnerabilities across\r\nRead More\r\nSubmit your research: BlueHat 2026 Call for Papers is open\r\nhttps://msrc.microsoft.com/blog/2022/10/hunting-for-cobalt-strike-mining-and-plotting-for-fun-and-profit/\r\nPage 1 of 3\n\nFriday, February 13, 2026\r\nThe next BlueHat Conference will take place May 5 - 6, 2026, on Microsoft’s Redmond campus in Washington\r\nState, USA. The Call for Papers (CFP) is now open and closes February 28, 2026. The BlueHat community brings\r\ntogether security researchers and\r\nRead More\r\nFixing the script: Journey to reduce XSS exposure\r\nMonday, February 9, 2026\r\nCross‑site scripting (XSS) remains one of the most frequently reported web vulnerabilities—not because\r\ndevelopers are unaware of it, but because many deployed mitigations address symptoms rather than root\r\ncauses. Across vulnerability reports and\r\nRead More\r\nHow Asem Eleraky went from a shared family PC to finding critical vulnerabilities\r\nMonday, February 9, 2026\r\nIn the world of vulnerability research, origin stories are rarely linear. For Asem Eleraky, the path to becoming a\r\nMicrosoft MVR began not in a SOC lab or a university classroom, but with a single family PC and a short daily\r\nwindow to explore his\r\nRead More\r\nFrom points to payouts: The evolution of the Microsoft security researcher\r\nleaderboard\r\nFriday, February 6, 2026\r\nThe global security research community plays a critical role in helping Microsoft protect customers. Through their\r\ndeep technical expertise, coordinated disclosure, and collaboration, researchers help identify and\r\nremediate vulnerabilities, and shape\r\nRead More\r\n“The bugs pick you”: Inside Wouter’s security research journey\r\nThursday, January 29, 2026\r\nIf you ask Wouter when his security journey began, he’ll take you back to a childhood in the Netherlands,\r\ntinkering with the 8086 PC his parents brought home when he was five or six. That early curiosity, fueled by\r\nracing games, trial-and-error\r\nhttps://msrc.microsoft.com/blog/2022/10/hunting-for-cobalt-strike-mining-and-plotting-for-fun-and-profit/\r\nPage 2 of 3\n\nRead More\r\nCongratulations to the top MSRC 2025 Q4 security researchers!\r\nMonday, January 5, 2026\r\nCongratulations to all the researchers recognized in this quarter’s Microsoft Researcher Recognition\r\nProgram leaderboard! Thank you to everyone for your hard work and continued partnership to secure customers.\r\nThe top three researchers of the 2025 Q4\r\nRead More\r\nSource: https://msrc.microsoft.com/blog/2022/10/hunting-for-cobalt-strike-mining-and-plotting-for-fun-and-profit/\r\nhttps://msrc.microsoft.com/blog/2022/10/hunting-for-cobalt-strike-mining-and-plotting-for-fun-and-profit/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://msrc.microsoft.com/blog/2022/10/hunting-for-cobalt-strike-mining-and-plotting-for-fun-and-profit/"
	],
	"report_names": [
		"hunting-for-cobalt-strike-mining-and-plotting-for-fun-and-profit"
	],
	"threat_actors": [],
	"ts_created_at": 1775791331,
	"ts_updated_at": 1775791336,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/85ea67fc685f34e1487c63195477d80264fa4e19.pdf",
		"text": "https://archive.orkl.eu/85ea67fc685f34e1487c63195477d80264fa4e19.txt",
		"img": "https://archive.orkl.eu/85ea67fc685f34e1487c63195477d80264fa4e19.jpg"
	}
}