Register for the October 30th web seminar featuring Microsoft Digital Defense Report 2024 insights.
Practical cyber defense
Cybercrime
Bold action against fraud: Disrupting Storm-1152
Look back on the Storm-1152 enforcement action, a multiteam effort combining threat intelligence, legal action, and industry partnership to disrupt a major cybercrime-as-a-service provider responsible for more than 750 million fraudulent Microsoft accounts.
Cybercrime
Disrupting the gateway services to cybercrime
Microsoft, with threat intelligence support from Arkose Labs, is taking technical and legal action to disrupt the number one seller and creator of fraudulent Microsoft accounts, a group we call Storm-1152. We are watching, taking notice, and will act to protect our customers.
Cybercrime
Microsoft, Amazon, and international law enforcement unite to fight tech support fraud
See how Microsoft and Amazon joined forces for the first time ever to take down illegal tech support call centers across India.
Cyber hygiene
Basic cyber hygiene prevents 99% of attacks
Basic cyber hygiene remains the best way to defend an organization’s identities, devices, data, apps, infrastructure, and networks against 98% of all cyber threats. Discover practical tips in a comprehensive guide.
Cracked Software
Inside the fight against hackers who disrupted hospitals and jeopardized lives
Go behind the scenes in a joint operation between Microsoft, software maker Fortra, and Health-ISAC to disrupt cracked Cobalt Strike servers and make it harder for cybercriminals to operate.
Cybercrime
Stopping cybercriminals from abusing security tools
Microsoft, Fortra™, and Health Information Sharing and Analysis Center partner to take technical and legal action to disrupt “cracked” legacy copies of Cobalt Strike, used by cybercriminals to distribute malware, including ransomware.
DDoS
Pervasive. Quick. Disruptive. 520,000 unique attacks examined.
Pre-empt distributed denial-of-service (DDoS) attacks with up-to-date analysis of DDoS attacks from 2022 and best practices for defense.
Threat hunting
Learn the ABCs of Threat Hunting
Explore the ABCs of Threat Hunting Guide to get tips on how to hunt, identify, and mitigate cyberthreats to help become more cyber-resilient.
Ransomware
Three ways to protect yourself from ransomware
Modern ransomware defense requires a lot more than just setting up detection measures. Discover the top three ways you can harden your network’s security against ransomware today.
Cybersecurity
Using cybersecurity to help manage volatility in the global threat landscape
As cyber threats evolve, it can be tough to prioritize the right steps to take to keep your organization safe. To remain proactive in your cybersecurity efforts, follow these essential steps to help stay ahead of potential threats.
CISO Insider
Issue 1
Navigate today’s threat landscape with perspectives from CISOs, exclusive analysis, and recommendations from security leaders.
CISO Insider
Issue 2
In this issue of CISO Insider, we hear from CISOs on what they’re seeing at the frontlines—from targets to tactics—and what steps they’re taking to help prevent and respond to attacks. We also hear how leaders are taking advantage of XDR and automation to scale their defense against sophisticated threats.
CISO Insider
Issue 3
CISOs share changing security priorities as their organizations shift to cloud-centric models and the challenges around bringing their entire digital estates along for the ride.
Get started
Join Microsoft events
Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
Talk to us
Follow Microsoft Security