Trace Id is missing
A person typing on a laptop.
Cybercrime

Egypt-based cybercriminal supplier’s websites seized

Microsoft's Digital Crimes Unit, in partnership with LF (Linux Foundation) Projects, seized 256 phishing sites, disrupting a cybercriminal operation targeting many sectors, including financial institutions. This action disrupts the cybercrime supply chain and helps protect users from downstream threats, including financial fraud, data theft, and ransomware.
A laptop, a blue backpack with a yellow button, and a school bag with other supplies.
Cyber signals

Education under siege

Study up on the cybersecurity challenges facing the education sector. Discover why education has become the third most-targeted industry for cyberattacks and learn what IT and security professionals in the education sector can do to help create safer environments.
A person with long hair
Meet the experts

Expert Profile: Homa Hayatyfar

Principal Data and Applied Science Manager Homa Hayatyfar describes the use of machine learning models to reinforce defenses, just one of many ways AI is changing the face of security.
A silhouette of a person with a cellphone
Emerging threats

Feeding from the trust economy: social engineering fraud

Explore an evolving digital landscape where trust is both a currency and a vulnerability. Discover the social engineering fraud tactics cyber attackers use most, and review strategies that can help you identify and outmaneuver social engineering threats designed to manipulate human nature.
A person sitting in a bean bag with a computer and a laptop
Intelligence reports

Digital threats from East Asia increase in breadth and effectiveness

Dive in and explore emerging trends in East Asia’s evolving threat landscape, where China conducts both widespread cyber and influence operations (IO), while North Korean cyber threat actors demonstrate growing sophistication.
A computer and phone on a table
Practical, cyber defense

Basic cyber hygiene prevents 99% of attacks

Basic cyber hygiene remains the best way to defend an organization’s identities, devices, data, apps, infrastructure, and networks against 99% of all cyber threats. Discover practical tips in a comprehensive guide.
A close-up of a smartphone
Emerging threats

Breaking down business email compromise

Digital crimes expert Matt Lundy provides business email compromise examples, breaking down one of the most common and costly forms of cyberattack.
A screenshot of a video game
Intelligence reports

Shifting tactics fuel surge in business email compromise

Business email compromise (BEC) is on the rise now that cybercriminals can obscure the source of their attacks to be even more nefarious. Learn about CaaS and how to help protect your organization.
A person in a suit
Meet the experts

Insights from Iranian threat actor expert Simeon Kakpovi

Senior threat intelligence analyst Simeon Kakpovi talks about training the next generation of cyber defenders and overcoming the sheer tenacity of Iranian threat actors.
A red circles on a yellow surface
Emerging threats

Anatomy of a modern attack surface

Managing a modern attack surface requires the right threat intelligence. This report can help tilt the playing field in favor of cyber security defenders
Abstract graphic of concentric circles in green, yellow, and white on a gray background.
Get started

Join Microsoft events

Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
A woman reading from a tablet while standing outside a building.
Talk to us

Join Microsoft’s tech community

Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.

Follow Microsoft Security