Register for the October 30th web seminar featuring Microsoft Digital Defense Report 2024 insights.
Intelligence reports
Microsoft Digital Defense Report
Microsoft Digital Defense Report
Microsoft Digital Defense Report 2024
The 2024 edition of the Microsoft Digital Defense Report examines the evolving cyber threats from nation-state threat groups and cybercriminal actors, provides new insights and guidance to enhance resilience and strengthen defenses, and explores generative AI's growing impact on cybersecurity.
Microsoft Digital Defense Report
Microsoft Digital Defense Report 2023: CISO Executive Summary
The CISO Executive Summary provides an introduction by Microsoft CISO Bret Arsenault and gives an in-depth, narrative-style summary, highlighting key points of interest for modern chief information security officers.
Microsoft Digital Defense Report
Microsoft Digital Defense Report 2023: Building cyber resilience
The latest edition of the Microsoft Digital Defense Report explores the evolving threat landscape and walks through opportunities and challenges as we become cyber resilient.
Microsoft Digital Defense Report
Microsoft Digital Defense Report 2023: Executive Summary
The Executive Summary provides an introduction on the threat landscape by Tom Burt, along with the top headlines from the reports five main chapters: The State of Cybercrime; Nation State Threats; Critical Cybersecurity Challenges; Innovating for Security and Resilience; and Collective Defense.
Microsoft Digital Defense Report
Microsoft Digital Defense Report 2022
In the 2022 edition of the Microsoft Digital Defense Report, Microsoft security experts illuminate today’s threat landscape, providing insights on emerging trends as well as historically persistent threats in the 2022 Microsoft Digital Defense Report.
Microsoft Digital Defense Report
Microsoft Digital Defense Report 2021
The 2021 edition Microsoft Digital Defense Report draws on insights, data, and more from trillions of daily security signals from across Microsoft, including the cloud, endpoints, and the intelligent edge.
Microsoft Digital Defense Report
Microsoft Digital Defense Report 2020
Introducing the Microsoft Digital Defense Report, a reimagining of the annual Microsoft Security Intelligence Report (SIR) published since 2005.
Cyber signals
Cyber signals
Inside the growing risk of gift card fraud
Discover why companies issuing gift or payment cards are the favored targets of Storm-0539, a Morocco-based threat actor leveraging cloud environments to attack gift card portals. Review the group’s methods and learn ways to strengthen defenses against their attacks.
Cyber signals
Navigating cyberthreats and strengthening defenses in the era of AI
Advances in artificial intelligence (AI) present new threats—and opportunities—for cybersecurity. Discover how threat actors use AI to conduct more sophisticated attacks, then review the best practices that help protect against traditional and AI-enabled cyberthreats.
Cyber signals
Cyberthreats increasingly target the world’s biggest event stages
Complex and target-rich, major sporting events and world-renown activities present opportunities for threat actors to disrupt travel, commerce, communication and emergency services, and more. Learn how to manage the vast, external attack surface and defend world event infrastructures.
Cyber signals
Shifting tactics fuel surge in business email compromise
Business email compromise (BEC) is on the rise now that cybercriminals can obscure the source of their attacks to be even more nefarious. Learn about CaaS and how to help protect your organization.
Cyber signals
The convergence of IT and OT
Prevent 98% of cyberattacks against IoT and OT devices. Learn how cybersecurity hygiene can be used to protect against ransomware and cyber extortion.
Cyber signals
Extortion economics
Ransomware, one of the most persistent and pervasive cyber threats, continues to evolve. Here is an in-depth look at ransomware as a service (Raas), the latest tool of cybercrime.
Cyber signals
• Dec 2023
Identity is the new battleground
Identity-based attacks are the latest targets in the world of cybercrime. Learn how to get help protect your organization from identity-based cyber threats.
Nation state
Nation state
Russia, Iran, and China continue influence campaigns before Election Day 2024
As the 2024 US presidential election cycle approaches its final weeks, Microsoft Threat Intelligence anticipates increased foreign influence activity leading up to Election Day. Learn how Russia, Iran, and China may attempt to sow doubt about the election's integrity by amplifying claims of fraud or rigging.
Nation state
Russia-linked operators engaged in expansive efforts to influence US voters
In a special report on cyber influence operations targeting the 2024 U.S. presidential election cycle, Microsoft Threat Intelligence examines Russian campaigns aimed at manipulating public opinion and sowing political discord.
Nation state
Iran steps into US election 2024 with cyber-enabled influence operations
Cyber-enabled influence operations targeting the 2024 US election season are already underway. Microsoft Threat Intelligence has observed an increase in foreign influence activity from actors backed by Iran, Russia, and China. Learn how these groups are using generative AI and other tactics to manipulate public opinion and sow discord.
Nation state
How Russia is trying to disrupt the 2024 Paris Olympic Games
Russian influence actors are adding AI to a decades-long legacy of disinformation aimed at the Olympic Games. Attempts to smear the reputation of the International Olympic Committee at this summer’s games in Paris, as well as multiple efforts to create an expectation of violence during the event, are expected to intensify as the games near.
Nation state
Same targets, new playbooks: East Asia threat actors employ unique methods
Microsoft Threat Intelligence has observed several key cyber and influence trends from China and North Korea since June 2023 that demonstrate not only doubling down on familiar targets, but also attempts to use more sophisticated influence techniques to achieve their goals.
Nation state
Iran surges cyber-enabled influence operations in support of Hamas
Discover details of Iran’s cyber-enabled influence operations supporting Hamas in Israel. Learn how operations have progressed through different phases of the war, and examine the four key influence tactics, techniques, and procedures (TTPs) Iran favors most.
Nation state
Russian threat actors dig in, prepare to seize on war fatigue
Russian cyber and influence operations persist as the war in Ukraine continues. Microsoft Threat Intelligence details the latest cyber threat and influence activities over the last six months.
Nation state
Digital threats from East Asia increase in breadth and effectiveness
Dive in and explore emerging trends in East Asia’s evolving threat landscape, where China conducts both widespread cyber and influence operations (IO), while North Korean cyber threat actors demonstrate growing sophistication.
Nation state
Iran turning to cyber-enabled influence operations for greater effect
Microsoft Threat Intelligence uncovered increased cyber-enabled influence operations out of Iran. Get threat insights with details of new techniques and where the potential for future threats exists.
Nation state
The cyber and influence operations of the war in Ukraine’s digital battlefield
Microsoft threat intelligence examines a year of cyber and influence operations in Ukraine, uncovers new trends in cyber threats, and what to expect as the war enters its second year.
Special Reports
Special Reports
Tax season cybersecurity: What cybercriminals want and who they target most. Is it you?
The tax man, and phishing campaigns, cometh. Microsoft Threat Intelligence reviews what criminals target, how they get it (including details from a newly observed 2024 campaign), and the best practices for keeping businesses and individuals (especially vulnerable populations) safe.
Special Reports
Defending Ukraine: Early Lessons from the Cyber War
How cyber-attacks and cyber influence operations are being used in the war between Russian and the Ukraine.
Special Reports
Special Report: Ukraine
Russian threat actors have launched increasingly disruptive and visible cyberattacks against Ukraine and have included activities such as phishing, reconnaissance, and attempts to compromise public information sources.
Nation state
Cyber Resilience
Learn five fundamental steps to enhance your organizations cyber resilience and help protect against ransomware and other malicious cyberattacks.
Get started
Join Microsoft events
Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
Talk to us
Join Microsoft’s tech community
Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.
Follow Microsoft Security