Guidance for investigating attacks using CVE-2023-23397 - Microsoft Security Blog

This guide provides steps organizations can take to assess whether users have been targeted or compromised by threat actors exploiting CVE-2023-23397.

Microsoft Security Blog
IIS modules: The evolution of web shells and how to detect them  - Microsoft Security Blog

This blog aims to provide further guidance on detecting malicious IIS modules and other capabilities that you can use during your own incident response investigations.

Microsoft Security Blog