Agent Foskett Cyber Briefings
Agent Foskett is GEMXIT’s official cyber security briefing series, created to help organisations understand real Microsoft security signals, threat hunting patterns and practical defensive lessons. These briefings are based on real-world observations across Microsoft 365, Azure environments, identity security, phishing investigations, cloud misconfigurations, KQL threat hunting and emerging AI governance challenges. Each scenario highlights what actually happened, what was missed, and what organisations can do before small issues become serious incidents.
About the briefings
Agent Foskett briefings translate real technical observations into clear, practical lessons for organisations operating modern Microsoft environments. They focus on the kinds of issues that often go unnoticed until they become operational, security or governance risks.
Why organisations read these briefings
Friday Cyber Briefings
This is the full detection guide using real Microsoft Defender data — EmailEvents, AuthenticationDetails, DMARC failures, spoofed domains and user click activity.
👉 Built from real-world investigations where everything looked “normal”… until it wasn’t.
But behind the scenes, DMARC had failed — and the message was still delivered.
No block. No warning. Just a trusted email that shouldn’t have been trusted.
But the authentication didn’t align — DMARC failed, signals conflicted, and the evidence told a different story.
This investigation shows how to read SPF, DKIM, DMARC and CompAuth in Microsoft Defender using KQL.
But behind the scenes, the domains didn’t align — what was shown and what was processed were not the same.
This investigation explains how to detect sender mismatch using EmailEvents and why it matters for spoofing detection.
But late at night, files started moving — dozens of downloads from SharePoint that didn’t match the user, the role, or the time.
No alert triggered. Because technically… everything was allowed.
This Agent Foskett briefing shows how modern scams use wallet connections, approval prompts and external channels to bypass traditional security controls.
GEMXIT PTY LTD GEMXIT UK LTD © GEMXIT 2026