Intelligence reports
Microsoft Digital Defense Report (MDDR)
Microsoft Digital Defense Report (MDDR)
Microsoft Digital Defense Report 2023: CISO Executive Summary
The CISO Executive Summary provides an introduction by Microsoft CISO Bret Arsenault and gives an in-depth, narrative-style summary, highlighting key points of interest for modern chief information security officers.
Microsoft Digital Defense Report (MDDR)
Microsoft Digital Defense Report 2023: Building cyber resilience
The latest edition of the Microsoft Digital Defense Report explores the evolving threat landscape and walks through opportunities and challenges as we become cyber resilient.
Microsoft Digital Defense Report (MDDR)
Microsoft Digital Defense Report 2023: Executive Summary
The Executive Summary provides an introduction on the threat landscape by Tom Burt, along with the top headlines from the reports five main chapters: The State of Cybercrime; Nation State Threats; Critical Cybersecurity Challenges; Innovating for Security and Resilience; and Collective Defense.
Microsoft Digital Defense Report (MDDR)
Microsoft Digital Defense Report 2022
In the 2022 edition of the Microsoft Digital Defense Report, Microsoft security experts illuminate today’s threat landscape, providing insights on emerging trends as well as historically persistent threats in the 2022 Microsoft Digital Defense Report.
Microsoft Digital Defense Report (MDDR)
Microsoft Digital Defense Report 2021
The 2021 edition Microsoft Digital Defense Report draws on insights, data, and more from trillions of daily security signals from across Microsoft, including the cloud, endpoints, and the intelligent edge.
Microsoft Digital Defense Report (MDDR)
Microsoft Digital Defense Report 2020
Introducing the Microsoft Digital Defense Report, a reimagining of the annual Microsoft Security Intelligence Report (SIR) published since 2005.
Cyber signals
Cyber signals
Cyberthreats increasingly target the world’s biggest event stages
Complex and target-rich, major sporting events and world-renown activities present opportunities for threat actors to disrupt travel, commerce, communication and emergency services, and more. Learn how to manage the vast, external attack surface and defend world event infrastructures.
Cyber signals
Shifting tactics fuel surge in business email compromise
Business email compromise (BEC) is on the rise now that cybercriminals can obscure the source of their attacks to be even more nefarious. Learn about CaaS and how to help protect your organization.
Cyber signals
• Dec 2023
The convergence of IT and OT
Prevent 98% of cyberattacks against IoT and OT devices. Learn how cybersecurity hygiene can be used to protect against ransomware and cyber extortion.
Cyber signals
• Dec 2023
Extortion economics
Ransomware, one of the most persistent and pervasive cyber threats, continues to evolve. Here is an in-depth look at ransomware as a service (Raas), the latest tool of cybercrime.
Cyber signals
Identity is the new battleground
Identity-based attacks are the latest targets in the world of cybercrime. Learn how to get help protect your organization from identity-based cyber threats.
Nation state
Nation state
Russian threat actors dig in, prepare to seize on war fatigue
Russian cyber and influence operations persist as the war in Ukraine continues. Microsoft Threat Intelligence details the latest cyber threat and influence activities over the last six months.
Nation state
Digital threats from East Asia increase in breadth and effectiveness
Dive in and explore emerging trends in East Asia’s evolving threat landscape, where China conducts both widespread cyber and influence operations (IO), while North Korean cyber threat actors demonstrate growing sophistication.
Nation state
• Dec 2023
Iran turning to cyber-enabled influence operations for greater effect
Microsoft Threat Intelligence uncovered increased cyber-enabled influence operations out of Iran. Get threat insights with details of new techniques and where the potential for future threats exists.
Nation state
The cyber and influence operations of the war in Ukraine’s digital battlefield
Microsoft threat intelligence examines a year of cyber and influence operations in Ukraine, uncovers new trends in cyber threats, and what to expect as the war enters its second year.
Special Reports
Special Reports
Defending Ukraine: Early Lessons from the Cyber War
How cyber-attacks and cyber influence operations are being used in the war between Russian and the Ukraine.
Special Reports
Special Report: Ukraine
Russian threat actors have launched increasingly disruptive and visible cyberattacks against Ukraine and have included activities such as phishing, reconnaissance, and attempts to compromise public information sources.
Special Reports
Cyber Resilience
Learn five fundamental steps to enhance your organizations cyber resilience and help protect against ransomware and other malicious cyberattacks.
Get started
Join Microsoft events
Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
Talk to us
Follow Microsoft