Understand top trends in the threat landscape

Get our perspective on 2018 cybersecurity trends such as cryptocurrency mining, supply chain attacks, and phishing in the Security Intelligence Report, Volume 24.

Documents linked from this page might be available in English only.

Stay up to date with the latest cyber security trends

The threat landscape is constantly changing. Stay on top of the latest trends that matter to you with our interactive security insights. Our threat researchers are sharing new data every month.

Security data points visualized as an abstract illustration representing topography and landscape.
Photograph of two people seated, one holding a folded Surface Book while pointing at the screen of laptop the other person is holding

Malware Microsoft encounters

Microsoft manages an extensive IT environment giving us a large-scale view of malware threats. Learn about the types we see attack our own platform and get recommendations based on our experience.

Over a decade of reporting on the threat landscape

We’ve been publishing threat intelligence reports for well over a decade. In that time, we’ve published over 12,000 pages of insights, over 100 blog posts, and delivered thousands of customer briefings all over the world. We have tracked a range of threats including trojans, worms, exploits, botnets, identity attacks, cloud threats, phishing, and much more. As technology changes and attackers rely on new techniques, we will continue watching and sharing the latest insights with you. 
    
What’s become evident is the cloud is a security game changer and a powerful way to help protect organizations. We understand the challenges our customers face in talent shortages and not always having the right intelligence. This is where Microsoft can help. Our operational scale as one of the world’s leading technology providers gives us insight into trillions of signals from billions of sources across endpoints, email, applications, consumer and commercial services, and on-premises technologies. We share that insight with you through our products and through intelligence reports such as this. We’ll continue exploring and providing you with new data and insights as the landscape changes and hope that you find value in the Microsoft Security Intelligence Report. 

Previous intelligence reports

Volume 23: February – December 2017

Volume 23 regional reports

Volume 22: January - March 2017

Volume 22 regional reports

Volume 21: January - June 2016

Volume 20: July - December 2015

Volume 19: January - June 2015

Volume 18: July - December 2014

Volume 17: January - June 2014

Volume 16: July – December 2013

Volume 15: January - June 2013

Volume 14: July - December 2012

Volume 13: January - June 2012

Volume 12: July - December 2011

Volume 11: January - June 2011

Volume 10: July - December 2010

Volume 9: January - June 2010

Volume 8: July - December 2009

Volume 7: January - June 2009

Volume 6: July - December 2008

Additional Resources

Graphic icon of rectangular dialog box with horizontal lines representing communication

Microsoft Secure blog

Thought leadership, research, how to’s, and advice on choosing and deploying security solutions.
Graphic icon of rectangular dialog box with horizontal lines representing communication

Security Response Center blog

Learn about the latest security updates and stay up to date on our bounty program.
Graphic icon of rectangular dialog box with horizontal lines representing communication

Security Tech Community blog

Your source for the latest information and updates about Microsoft Security products and services.
Graphic icon of person wearing a headset

Security Response Center

Engaging with security researchers to protect customers and the broader ecosystem for over 20 years.
Graphic icon of line graph with line going up and down

Windows Defender Security Intelligence

The single portal for anti-malware updates, threat analysis, and submitting files for analysis.

Top trends in the threat landscape