Trace Id is missing
A red circles in the sky
Emerging threats

2023 Threat Intelligence Year in Review: Key Insights and Developments

It has been an incredible year for Microsoft Threat Intelligence. The sheer volume of threats and attacks revealed through the more than 65 trillion signals we monitor daily has given us many inflection points, especially as we notice a shift in how threat actors are scaling and leveraging nation state support. The last year has […]
A group of people with a megaphone
Intelligence reports

Iran surges cyber-enabled influence operations in support of Hamas

Discover details of Iran’s cyber-enabled influence operations supporting Hamas in Israel. Learn how operations have progressed through different phases of the war, and examine the four key influence tactics, techniques, and procedures (TTPs) Iran favors most.
A computer screen with icons and symbols
Intelligence reports

Russian threat actors dig in, prepare to seize on war fatigue

Russian cyber and influence operations persist as the war in Ukraine continues. Microsoft Threat Intelligence details the latest cyber threat and influence activities over the last six months.
A blue and black background with text 10 essential insights
Emerging threats

10 essential insights from the Microsoft Digital Defense Report 2023

From the increasing sophistication of nation-state threat actors to the power of partnerships in building cyber resilience, the Microsoft Digital Defense Report reveals the latest threat landscape insights and walks through the opportunities and challenges we all face.
A person with black hair and security icons
Meet the experts

On the frontlines: Decoding Chinese threat actor tactics and techniques

Microsoft Threat Intelligence China experts Sarah Jones and Judy Ng join Microsoft Threat Intelligence Strategy director Sherrod DeGrippo to discuss the geopolitical landscape while providing advice and insight on modern cybersecurity careers.
A person smiling for a picture
Meet the experts

Putting cyber threat intelligence into geopolitical context

Threat intelligence expert Fanta Orr explains how threat intelligence analysis uncovers the “why” behind cyberthreat activity and helps better protect customers who might be vulnerable targets.
A fingerprint scan on a blue background
Emerging threats

7 emerging hybrid warfare trends from Russia’s cyber war

What can be expected from the second year of Russia’s hybrid war in Ukraine.
A close-up of a tennis court
Intelligence reports

Cyberthreats increasingly target the world’s biggest event stages

Complex and target-rich, major sporting events and world-renown activities present opportunities for threat actors to disrupt travel, commerce, communication and emergency services, and more. Learn how to manage the vast, external attack surface and defend world event infrastructures.
A blurry image of a hexagon pattern
Emerging threats

Cadet Blizzard emerges as a novel and distinct Russian threat actor

Microsoft attributes several campaigns to a distinct Russian state-sponsored threat actor tracked as Cadet Blizzard, including the WhisperGate destructive attack, Ukrainian website defacements, and the hack-and-leak front “Free Civilian”.
A person in a suit
Mee the experts

Insights from Iranian threat actor expert Simeon Kakpovi

Senior threat intelligence analyst Simeon Kakpovi talks about training the next generation of cyber defenders and overcoming the sheer tenacity of Iranian threat actors.
A computer screen with security key and a person
Intelligence reports

Iran turning to cyber-enabled influence operations for greater effect

Microsoft Threat Intelligence uncovered increased cyber-enabled influence operations out of Iran. Get threat insights with details of new techniques and where the potential for future threats exists.
A computer screen with icons of servers and shield
Intelligence reports

The cyber and influence operations of the war in Ukraine’s digital battlefield

Microsoft threat intelligence examines a year of cyber and influence operations in Ukraine, uncovers new trends in cyber threats, and what to expect as the war enters its second year.
A network of lights and dots
Emerging threats

Iran responsible for Charlie Hebdo Attacks

Microsoft is attributing a recent influence operation targeting French magazine Charlie Hebdo to an Iranian nation-state actor.
A blue, gray and green circular pattern
Intelligence reports

Microsoft Digital Defense Report 2022

In the 2022 edition of the Microsoft Digital Defense Report, Microsoft security experts illuminate today’s threat landscape, providing insights on emerging trends as well as historically persistent threats in the 2022 Microsoft Digital Defense Report.
Decorative
Intelligence reports

Microsoft Digital Defense Report 2021

The 2021 edition Microsoft Digital Defense Report draws on insights, data, and more from trillions of daily security signals from across Microsoft, including the cloud, endpoints, and the intelligent edge.
A purple and black dotted background
Intelligence reports

Microsoft Digital Defense Report 2020

Introducing the Microsoft Digital Defense Report, a reimagining of the annual Microsoft Security Intelligence Report (SIR) published since 2005.
Decorative
Emerging threats

Propaganda in the digital age: How cyber influence operations erode trust

Cyber influence operations are a prevalent tactic being used in the world of cybercrime to erode trust in the digital age.
A person in a suit
Meet the experts

Christopher Glyer: Principal Threat Intelligence Lead, MSTIC

As Principal Threat Intelligence Lead with a focus on ransomware at the Microsoft Threat Intelligence Center (MSTIC), Christopher Glyer is part of the team that investigates how the most advanced threat actors access and exploit systems.
Decorative
Intelligence reports

Defending Ukraine: Early Lessons from the Cyber War

How cyber-attacks and cyber influence operations are being used in the war between Russian and the Ukraine.
A map of europe with different countries/regions
Intelligence reports

Special Report: Ukraine

Russian threat actors have launched increasingly disruptive and visible cyberattacks against Ukraine and have included activities such as phishing, reconnaissance, and attempts to compromise public information sources.
A person looking at a computer screen
Intelligence reports

Identity is the new battleground

Identity-based attacks are the latest targets in the world of cybercrime. Learn how to get help protect your organization from identity-based cyber threats.
Abstract graphic of concentric circles in green, yellow, and white on a gray background.
Get started

Join Microsoft events

Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
A woman reading from a tablet while standing outside a building.
Talk to us

Join Microsoft’s tech community

Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.

Follow Microsoft Security