Trace Id is missing

Ransomware

A group of people sitting at a table
Practical cyber defense 

Inside the fight against hackers who disrupted hospitals and jeopardized lives

Go behind the scenes in a joint operation between Microsoft, software maker Fortra™, and Health-ISAC to disrupt cracked Cobalt Strike servers and make it harder for cybercriminals to operate.
A red circles on yellow surface
Emerging threats 

Anatomy of a modern attack surface

Managing a modern attack surface requires the right threat intelligence. This report can help tilt the playing field in favor of cyber security defenders
Decorative image
Practical cyber defense 

Stopping cybercriminals from abusing security tools

Microsoft, Fortra™, and Health Information Sharing and Analysis Center partner to take technical and legal action to disrupt “cracked” legacy copies of Cobalt Strike, used by cybercriminals to distribute malware, including ransomware.
A blue shield with a padlock on it
Emerging threats 

Security is only as good as your threat intelligence

More reinforcements have arrived. John Lambert, Threat intelligence leader explains how AI enhances the threat intelligence community.
A person smiling at camera
Supply chain

Industry expert weighs in on security in manufacturing

Industry expert Myrna Soto breaks down the state of cybersecurity across manufacturing, discussing the sector’s emerging risks and opportunities, future legislative developments, and best practices to help strengthen defenses.
A person in a suit and tie
Meet the experts

Discover how cybercriminals use tactics like social engineering to perpetrate attacks

Matt Lundy of the Microsoft Digital Crimes Unit (DCU) describes how the experts of the Identity and Platform Enforcement team help keep customers safe from threats like ransomware, business email compromise, and homoglyph domains.
A person holding a tablet
Practical cyber defense

CISO Insider: Issue 2

Navigate today’s threat landscape with perspectives from CISOs, exclusive analysis, and recommendations from security leaders.
A person in a suit
Meet the experts 

Christopher Glyer: Principal Threat Intelligence Lead, MSTIC

As Principal Threat Intelligence Lead with a focus on ransomware at the Microsoft Threat Intelligence Center (MSTIC), Christopher Glyer is part of the team that investigates how the most advanced threat actors access and exploit systems.
A person standing in front of a blue background with a green circle
Meet the experts

Threat intelligence expert Emily Hacker

Threat Intelligence Analyst Emily Hacker discusses how her team stays on top of the changing ransomware as a service landscape and the measures they take to help catch pre-ransomware actors.
Decorative image
Intelligence reports

Extortion economics

Ransomware, one of the most persistent and pervasive cyber threats, continues to evolve. Here is an in-depth look at ransomware as a service (Raas), the latest tool of cybercrime.
two girls smiling and talking with eatch other
Practical cyber defense 

Three ways to protect yourself from ransomware

Modern ransomware defense requires a lot more than just setting up detection measures. Discover three ways you can harden your network’s security against ransomware.
A person smiling at the camera
Meet the experts

Behind the scenes with cybercrime and counter ransomware expert Nick Carr

Nick Carr, Cybercrime Intelligence Team Lead at the Microsoft Threat Intelligence Center, discusses ransomware trends, explains what Microsoft is doing to protect customers from ransomware, and describes what organizations can do if they’ve been affected by it.
A person sitting in front of a computer
Emerging threats 

Protect your organization from ransomware

Guidance for protecting your organization against ransomware.
A close-up of arrows
Emerging threats 

Ransomware-as-a-service: The new face of industrialized cybercrime

Discover how to protect your organization from Ransomware-as-a-service (RaaS), a tactic that is gaining serious traction in the world of cybercrime.
A person wearing glasses and a striped shirt
Meet the experts 

Expert analysis from inside the Microsoft Security Response Center (MSRC)

Spend a moment behind the scenes with the MSRC’s Russ McRee, who shares his thoughts on the state of modern security.
A person and another person looking at a computer
Practical cyber defense 

Using cybersecurity to help manage volatility in the global threat landscape

As cyber threats evolve, it can be tough to prioritize the right steps to take to keep your organization safe. To remain proactive in your cybersecurity efforts, follow these essential steps to help stay ahead of potential threats.
A close-up of a person watching a computer
Intelligence reports 

Identity is the new battleground

Identity-based attacks are the latest targets in the world of cybercrime. Learn how to get help protect your organization from identity-based cyber threats.
A blue background with white red circles and arrows
Intelligence reports 

Cyber Resilience

Learn five fundamental steps to enhance your organizations cyber resilience and help protect against ransomware and other malicious cyberattacks.
Abstract graphic of concentric circles in green, yellow, and white on a gray background.
Woman reading a book on a leather sofa in a cozy living room setting.
Get started

Join Microsoft events

Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
A woman reading from a tablet while standing outside a building.
Talk to us

Join Microsoft’s tech community

Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.

Follow Microsoft