Register now to watch the on-demand web seminar featuring Microsoft Digital Defense Report 2024 insights.
Emerging Threats
Ransomware
US Healthcare at risk: Strengthening resiliency against ransomware attacks
When ransomware strikes healthcare, the prognosis can be grim: delayed treatments, compromised medical devices, and most importantly patient care at risk. Discover how to protect against these attacks and safeguard both patient safety and hospital operations.
AI
Defend, attribute, punish deterring cyber warfare in the age of AI
In a Microsoft-supported issue brief from FP Analytics, researchers explore possible NATO cyber deterrence strategies for the AI era. Key insights include AI's impact on cyber operations, holistic resilience, and effective retaliation strategies.
Social Engineering
Feeding from the trust economy: social engineering fraud
Explore an evolving digital landscape where trust is both a currency and a vulnerability. Discover the social engineering fraud tactics cyber attackers use most, and review strategies that can help you identify and outmaneuver social engineering threats designed to manipulate human nature.
Cyber influence operations
2023 Threat Intelligence Year in Review: Key Insights and Developments
Microsoft Threat Intelligence rounds up the top threat actor trends in TTPS (tactics, techniques, and practices) from 2023.
Microsoft Digital Defense Report
10 essential insights from the Microsoft Digital Defense Report 2023
From the increasing sophistication of nation-state threat actors to the power of partnerships in building cyber resilience, the Microsoft Digital Defense Report reveals the latest threat landscape insights and walks through the opportunities and challenges we all face
Nation state
7 emerging hybrid warfare trends from Russia’s cyber war
What can be expected from the second year of Russia’s hybrid war in Ukraine.
Threat actor
Cadet Blizzard emerges as a novel and distinct Russian threat actor
Microsoft attributes several campaigns to a distinct Russian state-sponsored threat actor tracked as Cadet Blizzard, including the WhisperGate destructive attack, Ukrainian website defacements, and the hack-and-leak front “Free Civilian”.
Living off the land (lotl)
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques
Chinese state-sponsored threat actor Volt Typhoon has been observed using stealthy techniques to target US critical infrastructure, conduct espionage, and dwell in compromised environments.
Atack surface
Anatomy of a modern attack surface
To manage an increasingly complex attack surface, organizations must develop a comprehensive security posture. With six key attack surface areas, this report will show you how the right threat intelligence can help tilt the playing field in favor of defenders.
AI
Security is only as good as your threat intelligence
More reinforcements have arrived. John Lambert, Threat intelligence leader explains how AI enhances the threat intelligence community.
Threat actor
MagicWeb exploit: Solving one of NOBELIUM’s most novel attacks
Get an inside look at how Microsoft threat intelligence investigated this never-before-seen attack. Learn about the attack flow, review real-time response details, and prepare yourself with strategies for avoiding similar attacks.
Nation state
Iran responsible for Charlie Hebdo Attacks
Microsoft is attributing a recent influence operation targeting French magazine Charlie Hebdo to an Iranian nation-state actor Microsoft tracks as NEPTUNIUM.
DDoS
Holiday season DDoS defense: Your guide to staying safe
Discover why distributed denial of service (DDoS) attacks surge between Black Friday and New Year and discover what you can do to help keep your organization safe.
DDoS
Protecting yourself from holiday-season DDoS attacks
’Tis the season for distributed denial of service (DDoS) attacks. See what drives criminals to increase DDoS activity during the holidays and learn what you can do to help protect your organization.
IT/IoT
Rising cyber threats in response to expanding IoT/OT connectivity
In our latest report, we explore how increasing IoT/OT connectivity is leading to greater and more-severe vulnerabilities for organized cyber threat actors to exploit.
Cyber influence operations
Propaganda in the digital age: How cyber influence operations erode trust
Survey the world of cyber influence operations, where nation states distribute propaganda designed to threaten the trustworthy information democracy requires to flourish.
Cybercrime
Cyberthreat Minute: The scale and scope of worldwide cybercrime in 60 seconds
During a cyberattack, every second counts. To illustrate the scale and scope of worldwide cybercrime, we’ve condensed a year’s worth of cybersecurity research into one 60-second window.
Ransomware
Protect your organization from ransomware
Get a glimpse of the criminal players who operate within the underground ransomware economy. We’ll help you understand the motivations and mechanics of ransomware attacks and provide you with best practices for protection as well as backup and recovery.
Ransomware
Ransomware-as-a-service: The new face of industrialized cybercrime
Cybercrime’s newest business model, human-operated attacks, emboldens criminals of varying ability.
Attack surface
Anatomy of an external attack surface
The cybersecurity world continues to become more complex as organizations move to the cloud and shift to decentralized work. Today, the external attack surface spans multiple clouds, complex digital supply chains, and massive third-party ecosystems.
Get started
Join Microsoft events
Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
Talk to us
Join Microsoft’s tech community
Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.
Follow Microsoft Security