Trace Id is missing

Special Reports

Intelligence reports

Defending Ukraine: Early Lessons from the Cyber War

How cyber-attacks and cyber influence operations are being used in the war between Russian and the Ukraine.
A map of europe with different countries/regions
Intelligence reports

Special Report: Ukraine

Russian threat actors have launched increasingly disruptive and visible cyberattacks against Ukraine and have included activities such as phishing, reconnaissance, and attempts to compromise public information sources.
A blue background with white and red circles and arrows
Intelligence reports

Cyber Resilience

Learn five fundamental steps to enhance your organizations cyber resilience and help protect against ransomware and other malicious cyberattacks.
Abstract graphic of concentric circles in green, yellow, and white on a gray background.
Woman reading a book on a leather sofa in a cozy living room setting.
Get started

Join Microsoft events

Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
A woman reading from a tablet while standing outside a building.
Talk to us

Join Microsoft’s tech community

Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.

Follow Microsoft