Trace Id is missing

Cyber Influence Operations

A red circles in the sky
Emerging threats

2023 Threat Intelligence Year in Review: Key Insights and Developments

It has been an incredible year for Microsoft Threat Intelligence. The sheer volume of threats and attacks revealed through the more than 65 trillion signals we monitor daily has given us many inflection points, especially as we notice a shift in how threat actors are scaling and leveraging nation state support. The last year has […]
A group of people with a megaphone
Intelligence reports

Iran surges cyber-enabled influence operations in support of Hamas

Discover details of Iran’s cyber-enabled influence operations supporting Hamas in Israel. Learn how operations have progressed through different phases of the war, and examine the four key influence tactics, techniques, and procedures (TTPs) Iran favors most.
A computer screen with icons and symbols
Intelligence reports

Russian threat actors dig in, prepare to seize on war fatigue

Russian cyber and influence operations persist as the war in Ukraine continues. Microsoft Threat Intelligence details the latest cyber threat and influence activities over the last six months.
A person sitting in a bean bag with a computer
Intelligence reports

Digital threats from East Asia increase in breadth and effectiveness

Dive in and explore emerging trends in East Asia’s evolving threat landscape, where China conducts both widespread cyber and influence operations (IO), while North Korean cyber threat actors demonstrate growing sophistication.
A fingerprint scan on a blue background
Emerging threats

7 emerging hybrid warfare trends from Russia’s cyber war

What can be expected from the second year of Russia’s hybrid war in Ukraine.
A computer screen with security key and a person
Intelligence reports

Iran turning to cyber-enabled influence operations for greater effect

Discover how Iranian state actors are using cyber-enabled influence operations to fuel geopolitical change. Read more about their tactics here.
A computer screen with icons of servers and shield
Intelligence reports

The cyber and influence operations of the war in Ukraine’s digital battlefield

Microsoft threat intelligence examines a year of cyber and influence operations in Ukraine, uncovers new trends in cyber threats, and what to expect as the war enters its second year.
A network of lights and dots
Emerging threats

Iran responsible for Charlie Hebdo Attacks

Microsoft is attributing a recent influence operation targeting French magazine Charlie Hebdo to an Iranian nation-state actor.
A blue, gray and green circular pattern
Intelligence reports

Microsoft Digital Defense Report 2022

In the 2022 edition of the Microsoft Digital Defense Report, Microsoft security experts illuminate today’s threat landscape, providing insights on emerging trends as well as historically persistent threats in the 2022 Microsoft Digital Defense Report.
Emerging threats

Propaganda in the digital age: How cyber influence operations erode trust

Cyber influence operations are a prevalent tactic being used in the world of cybercrime to erode trust in the digital age.
Abstract graphic of concentric circles in green, yellow, and white on a gray background.
Woman reading a book on a leather sofa in a cozy living room setting.
Get started

Join Microsoft events

Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
A woman reading from a tablet while standing outside a building.
Talk to us

Join Microsoft’s tech community

Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.

Follow Microsoft