Labs

Research Highlights
Where experiments become engineering patterns.

Research at Wolfe Defense Labs is aimed at one thing: turning emerging attacker tradecraft, cloud realities, and defensive gaps into patterns we can deploy in real environments. This page surfaces a subset of that work—enough to show how we think, test, and refine.

Offensive & defensive experiments Cloud, identity & SaaS focused Directly feeds client work

Highlights below represent ongoing lines of research—not static whitepapers that age out in a year.

Discuss a research-informed engagement
Current themes

What we’re actively exploring right now

These research lanes show up in our client work, our internal detection engineering, and the tools we maintain. They evolve as the ecosystem does.

Cloud / SaaS

Living off the Cloud

Modern persistence and command-and-control rarely look like classic malware anymore. We study how attackers live inside SaaS and identity:

  • Abuse of OAuth apps, tokens, and delegated scopes
  • M365 & Google Workspace persistence patterns
  • Using benign automation (Flows, Apps Script, etc.) as infrastructure
Identity

Abusing misaligned identity design

Identity is the new perimeter, but it’s also the new lateral movement layer. We focus on:

  • Privilege escalation via Entra ID roles & app registrations
  • Attack paths through legacy auth and mis-scoped Conditional Access
  • Identity-first threat modeling for small and mid-sized environments
Detection

Signals that survive attacker adaptation

Instead of chasing every new technique, we look for durable detection opportunities:

  • High-quality anomalies in cloud & identity logs
  • Detection engineering patterns that scale down to lean teams
  • Balancing noise vs. missed detections for hybrid environments
Selected highlights

Examples of research in practice

A non-exhaustive sampling of work that’s influenced how we build solutions, services, and guidance for clients. Some appear as public talks or posts; many stay private and flow directly into engineering and advisory.

Case study

From shared inbox to full tenant exposure

Real-world analysis of how an attacker can pivot from a single compromised shared mailbox into broader M365 and data access with minimal tooling.

  • Abuse of forwarding rules and OAuth consent
  • Detection opportunities in Entra & mailbox logs
  • Containment patterns we now bake into IR playbooks
Technique

Quiet lateral movement in hybrid environments

Testing and refining paths that avoid “obvious” signatures, including:

  • Token theft and reuse across on-prem and cloud
  • Pivoting via management tools and remote access software
  • Endpoint hardening patterns derived from repeated tests
Pattern

Security controls that scale for small teams

Not every environment gets a 24/7 SOC. We study which controls provide outsized value for lean security teams:

  • Minimal viable logging and retention: where it really matters
  • Opinionated M365 / Workspace & endpoint baselines
  • IR workflows that don’t assume a large cast of responders
Applied research

How lab work shows up in your environment

Research is only valuable if it changes how we design, defend, or respond. We deliberately wire lab findings back into our solutions and services.

Solution design

We use research outcomes to shape what our solutions actually include—whether that’s which attack paths we test, which controls we recommend, or how we structure IR playbooks.

Service methodology

Engagements like Attack Surface Assessment, Adversarial Testing, and M365 Hardening use lab-derived checklists, test cases, and abuse paths.

Playbooks & templates

Research-driven patterns feed directly into guides, checklists, and playbooks available in the Resources section for clients and partners.

Training & briefings

We turn complex research topics into briefings that leadership, security teams, and engineers can act on without needing to become specialists themselves.

Want research that lands as real defenses?

We use these research lanes to design solutions, not just slides. If you want your security program informed by current tradecraft, we should talk.

Discuss a research-informed engagement Explore related research notes