This is the Trace Id: 6cd17ba099e80ea8388358bd10a287e1

Threat trends

Chart showing three types of fileless threats

Identity-based attacks

Learn about the different techniques threat actors are using to attack identities and gain access to resources
Windows Defender ATP shown with several icons representing its security capabilities

Business email compromise (BEC)

Identify BEC attacks and learn how to protect organizations from this threat

Threat actor updates

A hill with cogs and other parts of a machine in the background

Nation-state threat actors

Nation-state threat actors launch cyber operations that are often focused on collecting data on their targets
Chart showing three types of fileless threats

Financially motivated threat actors

Cybercriminals continue to enhance their tools and techniques to maximize the impact of their campaigns, including ransomware and identity theft 
Windows Defender ATP shown with several icons representing its security capabilities

Nation-state influence operations

Nation-states launch influence operations to sway public perception and sentiment, sow discord, and undermine trust in public institutions
Industrial operator with computing devices that can be affected by malware

Threat actor spotlight: Sleet actors

Learn about the latest activity associated with North Korean threat actors
Security Operations Center personnel responding to security incidents

Microsoft threat actor naming taxonomy

Learn about how Microsoft names threat actors 
Aerial shot of Chicago showing buildings that represent businesses that should be protected

Threat actors using AI

Learn about emerging threats in the age of AI, focusing on identified activity associated with known threat actors

Follow us