Labs · Research Notes

Research Notes
Real-world tradecraft for modern security leaders

Short, opinionated pieces from Wolfe Defense Labs on how attackers actually operate in cloud, SaaS, and identity-driven environments—and what boards, CISOs, and engineers need to do differently if they want to survive the next five years.

Use these as inputs to strategy, tabletops, and architecture changes—not as finished doctrine.

Browse

Filter by theme

Filter notes by focus area. Tags on each card map to a single primary category for browsing.

Cloud & SaaS Tradecraft

Living Off the Cloud: Modern Persistence in M365 & SaaS

How attackers turn legitimate cloud features—mail rules, app consents, automation, and shared identities—into long-term persistence with no malware and minimal noise.

Identity & access Cloud & SaaS
Read note →
Detection Engineering

Fewer, Better Signals: Detection Engineering for Lean Teams

Why most detection stacks produce infinite alerts but little insight, and how to design a small, opinionated signal set that your team can actually investigate.

Detection & telemetry Incident operations
Read note →
Incident Readiness

Tabletops That Matter: Designing Exercises That Actually Change Behavior

Most tabletops are scripted success stories. This note outlines how to design exercises that expose real decision bottlenecks, authority gaps, and blind spots.

Incident readiness Governance
Read note →
Identity Design

Identity Design Failures You Can’t Fix with MFA

MFA is not a magic shield. When the underlying identity and tenant design is flawed, strong authentication simply protects bad assumptions.

Identity & access Cloud tenancy
Read note →
Board & Leadership

Governance vs. Reality: What Boards Aren’t Seeing

Why board dashboards, maturity scores, and compliance status often fail to reflect how an organization will actually fare in a serious incident—and what to measure instead.

Governance & board Incident impact
Read note →
AI & Access

AI Is the New Insider: Managing Model-Driven Access & Leakage

As organizations plug LLMs into internal data and workflows, models inherit insider access without human judgment.

AI & emerging Data exposure
Read note →
Identity & Lifecycle

The Audit That Never Runs: Dormant Identities as Attack Infrastructure

Stale accounts—ex-employees, migration users, abandoned service principals— quietly become ideal attacker footholds.

Identity & access Lifecycle hygiene
Read note →
Incident Response

SOCless Breach: Incident Response Without a Control Plane

What happens when the systems you rely on to detect, log, and contain an intrusion are themselves degraded or compromised.

Incident readiness Detection & telemetry
Read note →
Lateral Movement

Lateral Movement in 2025: From Kerberos to Contracts

Lateral movement now flows through vendors, MSPs, SaaS apps, and identity providers— not just subnets.

Cloud & SaaS Supply chain
Read note →
Strategy

Resilience Is Not Zero Trust: Why Businesses Die in the Middle

Half-finished Zero Trust programs often increase complexity without improving survivability.

Governance & board Incident readiness
Read note →
Organizational Risk

The One-Person Kill Switch: Organizational Vulnerability Nobody Tracks

A person with concentrated authority, access, and knowledge can block or derail critical response actions—often invisibly.

Organizational risk Governance
Read note →
Authentication Risk

The Quiet Breach: How Legacy MFA Bypass Still Works in 2025

Attackers rarely “beat MFA.” They walk around it—through legacy auth paths, session reuse, token abuse, and app permissions that were never brought fully under policy control.

MFA & session Identity
Read note →
Privileged Access

Why “Global Admin” Is Still the Most Dangerous Job Title in IT

Global Admin is a tenant-level superpower. When over-assigned or routinely used, it turns normal mistakes into total tenant compromise—and gives attackers control of policy, visibility, and recovery paths.

Identity & access Governance
Read note →
Privileged Access

Break-Glass Accounts: How Most Organizations Implement Them Wrong

Break-glass is a recovery control—not a convenience account. Most implementations create a permanent bypass: rarely tested, lightly monitored, and assumed safe because it’s “not used.” This note covers failure modes and a safer operating model that survives real incidents.

Identity & access Incident readiness
Read note →
Identity Abuse

Token Theft vs. Password Theft: The New Identity War

Password theft is noisy and increasingly ineffective. Token theft is quiet, durable, and bypasses MFA entirely. This note breaks down how attackers abuse sessions, OAuth, and delegated trust—and why most identity programs are defending the wrong layer.

Identity & access MFA & sessions Cloud abuse
Read note →
Identity Controls

Conditional Access Isn’t a Firewall: Common Misconceptions

Conditional Access governs authentication—not behavior. Treating it like a firewall creates dangerous blind spots where attackers operate entirely within “allowed” access. This note breaks down where CA works, where it doesn’t, and how those gaps get abused.

Identity & access Cloud governance MFA & sessions
Read note →
Ransomware

How Modern Ransomware Crews Choose Their Victims

Ransomware targeting is deliberate and economic. Crews prioritize disruption leverage, recovery weakness, and decision friction—often selecting victims long before encryption begins. This note explains the signals attackers use and how leaders can reduce “payment probability.”

Ransomware Incident readiness Governance
Read note →
Ransomware

EDR Blindspots: Where Ransomware Still Wins

EDR is necessary—but not sufficient. Modern ransomware campaigns succeed by operating outside endpoint visibility: identity abuse, remote management tooling, unmanaged assets, and recovery sabotage. This note breaks down where EDR stops—and attackers keep going.

Ransomware Detection & telemetry Incident readiness
Read note →
Ransomware

The Backup Lie: Why “We Have Backups” Isn’t a Strategy

Backups reduce data loss—not business risk. In real ransomware events, restores fail under pressure due to compromised backup infrastructure, slow timelines, missing dependencies, and unrealistic staffing assumptions. This note explains why “we have backups” collapses and what recovery readiness looks like.

Ransomware Incident readiness Governance
Read note →
Ransomware

Double Extortion Is Now Table Stakes

Encryption is no longer the primary threat. Modern ransomware operations assume data theft first, disruption second, and public pressure always. This note explains why recovery alone doesn’t neutralize extortion—and why disclosure readiness is now a governance issue.

Ransomware Incident readiness Governance
Read note →
Incident Readiness & IR

Why Ransomware Response Fails in the First 60 Minutes

Most ransomware outcomes are decided before encryption finishes and before leadership has clarity. This note examines the predictable governance, identity, and communication failures that derail response in the first hour—and create irreversible attacker leverage.

Ransomware Incident readiness Governance & decision risk
Read note →
Ransomware

The Negotiation Starts Before You Know You’re Breached

Modern ransomware crews shape leverage weeks in advance—stabilizing access, stealing high-pressure data, weakening recovery paths, and mapping what the business cannot tolerate. By the time encryption begins, the “decision” has often already been engineered.

Ransomware Incident readiness Governance & board risk
Read note →
Ransomware

Backup Success ≠ Restore Success: The Recovery Gap Nobody Measures

Backup dashboards stay green until ransomware hits. This note explains why restores fail under pressure—identity lockouts, missing dependencies, unrealistic timelines—and why recovery readiness is an operating capability, not a storage feature.

Ransomware Incident readiness Governance & board risk
Read note →
Identity & Access

Identity Is the New Blast Radius: Why One Incident Becomes Many

When identity is centralized, compromise scales through trust relationships—across SaaS, vendors, and internal apps. This note explains how OAuth, tokens, federation, and standing access turn a single foothold into multi-domain impact.

Identity & access Cloud & SaaS Governance
Read note →
MFA & Session

Conditional Access Drift: How Good Policies Quietly Become Useless

Conditional Access rarely fails all at once. It erodes through exceptions, legacy auth paths, and “temporary” bypasses until enforcement no longer matches the threat model. This note covers how drift happens—and how to restore coverage that actually reduces risk.

MFA & session Identity & access Governance
Read note →
Detection & Telemetry

Detection Without Response Is Theater

Many organizations can detect intrusions quickly; but still fail to prevent impact. The constraint is not alert quality, but authority, tooling, and decision-making under pressure. This note explains why alerts alone don’t change outcomes.

Detection & telemetry Incident readiness Governance
Read note →
Cloud, SaaS & Supply Chain

SaaS Supply Chain Reality: Your Most Privileged Accounts Aren’t Yours

Vendors, MSPs, and third-party integrations often hold standing access that exceeds internal admins. This note explains why supply chain access is one of the highest-risk identity surfaces in modern environments and how attackers exploit it quietly.

Cloud & SaaS Identity & access Governance
Read note →
MFA & Session

The MFA Mirage: When Strong Authentication Still Produces Weak Security

MFA hardens logins; not outcomes. Token theft, session replay, OAuth consent abuse, and legacy authentication paths allow attackers to persist without ever “beating MFA.” This note explains where MFA stops and real identity risk begins.

MFA & session Identity & access Detection & telemetry
Read note →
AI & Emerging

AI as a New Insider: The Quiet Creation of High-Privilege Workflows

As teams connect models to internal data and action-taking systems, AI inherits insider-like access without human judgment. This note explains how privilege emerges through integrations, approvals, and automation; and how governance should adapt.

AI & emerging Governance & board Cloud & SaaS
Read note →

Want to turn these notes into action?

Wolfe Defense Labs works with security leaders, boards, and ops teams to translate research into architecture changes, detection roadmaps, and incident exercises that hold up under real pressure.

Talk with our vCISOs Explore more from the labs