{"id":2421,"date":"2025-12-08T05:51:20","date_gmt":"2025-12-08T13:51:20","guid":{"rendered":"https:\/\/celacampaindev.wpenginepowered.com\/?page_id=2421"},"modified":"2026-04-02T11:29:10","modified_gmt":"2026-04-02T18:29:10","slug":"microsoft-digital-defense-report-2025","status":"publish","type":"page","link":"https:\/\/celacampaig.wpenginepowered.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/","title":{"rendered":"Microsoft Digital Defense Report 2025"},"content":{"rendered":"<div data-bi-ct=\"group\" class=\"wp-block-group alignfull has-white-color has-deep-blue-background-color has-text-color has-background has-link-color microsoft-breakpoint-id-xjzatmrld wp-elements-cf7beac6f1a6e5612691e7b019c74b6b has-global-padding is-layout-constrained wp-container-core-group-is-layout-19e250f3 wp-block-group-is-layout-constrained\" data-microsoft-breakpoint-id=\"xjzatmrld\"><section data-bi-ct=\"group\" class=\"wp-block-group alignfull has-global-padding is-layout-constrained wp-block-group-is-layout-constrained has-background\" id=\"defense-report\" style=\"border-bottom-color:var(--wp--preset--color--clear-teal);border-bottom-width:2px;background-image:url('https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/10\/mddr-hero-media-scaled-e1760473631661.webp');background-size:cover;\"><div data-bi-ct=\"group\" class=\"wp-block-group alignfull temp-heroblur has-microsoft-midnight-gradient-background has-background microsoft-breakpoint-id-7t1t60ilm has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--2-xl-fluid);padding-bottom:var(--wp--preset--spacing--2-xl-fluid)\" data-microsoft-breakpoint-id=\"7t1t60ilm\"><div data-bi-ct=\"group\" class=\"wp-block-group alignwide is-vertical is-layout-flex wp-container-core-group-is-layout-2c3c9298 wp-block-group-is-layout-flex\" style=\"min-height:85vh\"><div data-bi-ct=\"group\" class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-40e9eaf8 wp-block-group-is-layout-constrained\"><h1 class=\"wp-block-heading alignwide has-display-large-fluid-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--xl-fluid)\">Microsoft Digital Defense Report 2025<\/h1>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-93be97b2 wp-block-group-is-layout-constrained\"><p class=\"has-body-large-fluid-font-size wp-block-paragraph\" style=\"margin-bottom:var(--wp--preset--spacing--2-xl-fluid)\">This year&rsquo;s Microsoft Digital Defense Report (MDDR) showcases the scale and sophistication of today&rsquo;s cyber threats, the impact of emerging technologies on those threats, and the strategies that leaders, governments, and defenders can use to defend against them.<\/p>\n<\/div>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button has-custom-width wp-block-button__width-50 is-style-outline mobile-full-width is-style-outline--1\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"button\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=1\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Read the full report\">Read the full report<svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" style=\"width: 1em;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button has-custom-width wp-block-button__width-50 is-style-outline mobile-full-width is-style-outline--2\"><a data-bi-an=\"Beyond our report\" data-bi-ct=\"button\" data-bi-hn=\"Beyond our report\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/aka.ms\/MDDR_ExecSummaryGov#page=1\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Read the government executive summary\">Read the government executive summary<svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" style=\"width: 1em;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n<section data-bi-ct=\"group\" class=\"wp-block-group alignwide is-layout-flow wp-container-core-group-is-layout-7180e814 wp-block-group-is-layout-flow\" style=\"padding-top:var(--wp--preset--spacing--md);padding-bottom:var(--wp--preset--spacing--2-xl-fluid)\"><div data-bi-ct=\"group\" class=\"wp-block-group is-content-justification-right is-nowrap is-layout-flex wp-container-core-group-is-layout-1967657b wp-block-group-is-layout-flex\"><p class=\"has-body-sm-font-size wp-block-paragraph\" style=\"font-style:normal;font-weight:600;letter-spacing:6px;text-transform:uppercase\">Share<\/p>\n\n\n<div style=\"--social-share-foreground-color: #152237;--social-share-background-color: #fff;\" class=\"social-share social-share--size-medium wp-block-microsoft-social-share-social-share\" data-wp-interactive=\"microsoft-social-share\">\n\n\t\n\t<ul class=\"social-share__list\">\n\t\t\t\t\t<li class=\"social-share__item\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fcorporate-responsibility%2Fcybersecurity%2Fmicrosoft-digital-defense-report-2025%2F\" aria-label=\"Share on LinkedIn\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"social-share__link social-share--linkedin\" data-bi-socchn=\"Linkedin\" data-bi-cn=\"Share Linkedin\" data-bi-ecn=\"Share Linkedin\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-an=\"Microsoft Digital Defense Report 2025\" data-bi-ct=\"socialshare\">\n\t\t\t\t\t\t<span aria-hidden=\"true\" class=\"microsoft-social-share-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 25\"><path fill=\"var(--social-share-background-color)\" d=\"M10.998.412c-8.922.654-13.956 10.862-9.123 18.441 4.752 7.45 15.734 7.369 20.336-.18C27.345 10.256 20.754-.294 10.998.422zM8.918 16.68h-2.24V9.311h2.24zm.08-9.22c-.753 1.902-3.617.14-2.16-1.43.935-1.007 2.713.04 2.16 1.43m8.46 9.22h-2.24v-4.53s-.18-.493-.221-.553c-.402-.685-1.608-.614-2.05.03-.15.211-.321.775-.321 1.017v4.036h-2.24V9.311h2.17v.986c.763-1.017 1.778-1.288 3.014-1.087 1.004.161 1.889 1.248 1.889 2.255v5.234-.02Z\"><\/path><\/svg><\/span>\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t<li class=\"social-share__item\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fcorporate-responsibility%2Fcybersecurity%2Fmicrosoft-digital-defense-report-2025%2F&amp;text=Microsoft+Digital+Defense+Report+2025\" aria-label=\"Share on X\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"social-share__link social-share--x\" data-bi-socchn=\"X\" data-bi-cn=\"Share X\" data-bi-ecn=\"Share X\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-an=\"Microsoft Digital Defense Report 2025\" data-bi-ct=\"socialshare\">\n\t\t\t\t\t\t<span aria-hidden=\"true\" class=\"microsoft-social-share-svg\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\"><circle cx=\"12.366\" cy=\"11.635\" r=\"11.635\" fill=\"var(--social-share-background-color)\"><\/circle><path fill=\"var(--social-share-foreground-color)\" d=\"m13.474 10.745 4.331-4.927H16.78l-3.763 4.277-3.003-4.278H6.548l4.543 6.47-4.543 5.165h1.026l3.972-4.518 3.172 4.519h3.465l-4.71-6.708Zm-5.53-4.17h1.577l2.956 4.136.46.645 3.842 5.376h-1.577z\"><\/path><\/svg><\/span>\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t<\/ul>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-ir3qxmzvx is-layout-flow wp-block-group-is-layout-flow\" data-microsoft-breakpoint-id=\"ir3qxmzvx\"><div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-ght0p2chs is-layout-flow wp-container-core-group-is-layout-b5f8871a wp-block-group-is-layout-flow\" data-microsoft-breakpoint-id=\"ght0p2chs\"><h2 class=\"wp-block-heading has-body-3-xl-fluid-font-size\" style=\"padding-top:0;padding-bottom:0\">Our unique vantage point<\/h2>\n\n\n<p class=\"has-body-font-size wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs)\">Microsoft&rsquo;s global presence&mdash;spanning billions of users, millions of organizations, and a vast network of partners&mdash;provides us with an unparalleled perspective on the cybersecurity threat landscape.<\/p>\n<\/div>\n\n\n<div data-bi-ct=\"group\" data-wp-context='{\"config\":{\"showOverflow\":false,\"responsive\":{\"mobile\":{\"enabled\":true,\"slidesPerViewMode\":\"fixed\",\"slidesPerView\":1.3,\"spaceBetween\":32,\"autoHeight\":true,\"loop\":true,\"autoplay\":false,\"autoplayDelay\":3000,\"navigation\":true,\"pagination\":false},\"tablet\":{\"enabled\":false,\"slidesPerViewMode\":\"fixed\",\"slidesPerView\":2,\"spaceBetween\":15,\"autoHeight\":false,\"loop\":false,\"autoplay\":false,\"autoplayDelay\":3000,\"navigation\":true,\"pagination\":true},\"desktop\":{\"enabled\":false,\"slidesPerViewMode\":\"fixed\",\"slidesPerView\":3,\"spaceBetween\":20,\"autoHeight\":false,\"loop\":false,\"autoplay\":false,\"autoplayDelay\":3000,\"navigation\":true,\"pagination\":true}}},\"type\":\"group\"}' data-wp-init=\"actions.init\" data-wp-interactive=\"microsoft-core\/carousel\" data-wp-on-window--resize=\"actions.handleResize\" class=\"wp-block-group tablet-3-column desktop-3-column wp-block-carousel microsoft-breakpoint-id-dny8gj7su wp-block-query-carousel is-layout-grid wp-container-core-group-is-layout-12ef3732 wp-block-group-is-layout-grid\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm)\" data-microsoft-breakpoint-id=\"dny8gj7su\"><div data-bi-ct=\"group\" class=\"wp-block-group is-layout-grid wp-container-core-group-is-layout-45229e17 wp-block-group-is-layout-grid\" style=\"min-height:%\"><h3 class=\"wp-block-heading has-deep-blue-color has-light-teal-background-color has-text-color has-background has-link-color has-body-medium-fluid-font-size wp-elements-46e4bd60698be3cf92143ffc93d4dcd5\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">100 trillion<\/h3>\n\n\n<p class=\"has-deep-blue-color has-clear-teal-background-color has-text-color has-background has-link-color has-body-font-size wp-elements-2765e10336fa6af11431d186cb516ca4 wp-container-content-d5427a95 wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">100 trillion security signals processed daily<\/p>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-layout-grid wp-container-core-group-is-layout-45229e17 wp-block-group-is-layout-grid\" style=\"min-height:%\"><h3 class=\"wp-block-heading has-deep-blue-color has-light-teal-background-color has-text-color has-background has-link-color has-body-medium-fluid-font-size wp-elements-af8308f72472f15e6ec0966dcbd76f83\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">4.5 million<\/h3>\n\n\n<p class=\"has-deep-blue-color has-clear-teal-background-color has-text-color has-background has-link-color has-body-font-size wp-elements-14bdb9bdbbdb51c830db568354493074 wp-container-content-d5427a95 wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">4.5 million net new malware file blocks every day<\/p>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-layout-grid wp-container-core-group-is-layout-45229e17 wp-block-group-is-layout-grid\" style=\"min-height:%\"><h3 class=\"wp-block-heading has-deep-blue-color has-light-teal-background-color has-text-color has-background has-link-color has-body-medium-fluid-font-size wp-elements-1e7b1fac54add56adda63d04ab8ed8b8\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">38 million<\/h3>\n\n\n<p class=\"has-deep-blue-color has-clear-teal-background-color has-text-color has-background has-link-color has-body-font-size wp-elements-46221e22f3f3f29c50ad72e677ccdac5 wp-container-content-d5427a95 wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">38 million identity risk detections analyzed in an average day<\/p>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-layout-grid wp-container-core-group-is-layout-45229e17 wp-block-group-is-layout-grid\" style=\"min-height:%\"><h3 class=\"wp-block-heading has-deep-blue-color has-light-teal-background-color has-text-color has-background has-link-color has-body-medium-fluid-font-size wp-elements-ec310a040a22d1f3462ef4a94b284dad\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">15,000+<\/h3>\n\n\n<p class=\"has-deep-blue-color has-clear-teal-background-color has-text-color has-background has-link-color has-body-font-size wp-elements-ca5d02932126b0d71eecb573bb6eab59 wp-container-content-d5427a95 wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">15,000 partners in our security ecosystem, making it one of the largest in the world<\/p>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-layout-grid wp-container-core-group-is-layout-45229e17 wp-block-group-is-layout-grid\" style=\"min-height:%\"><h3 class=\"wp-block-heading has-deep-blue-color has-light-teal-background-color has-text-color has-background has-link-color has-body-medium-fluid-font-size wp-elements-71a83e7f4fbdba582ed015cdcbe2889a\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">34,000<\/h3>\n\n\n<p class=\"has-deep-blue-color has-clear-teal-background-color has-text-color has-background has-link-color has-body-font-size wp-elements-3bbe1d78b919fe4c3070457f9b415b10 wp-container-content-d5427a95 wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">34,000 full-time equivalent security engineers employed worldwide<\/p>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-layout-grid wp-container-core-group-is-layout-45229e17 wp-block-group-is-layout-grid\" style=\"min-height:%\"><h3 class=\"wp-block-heading has-deep-blue-color has-light-teal-background-color has-text-color has-background has-link-color has-body-medium-fluid-font-size wp-elements-d7d5c733e187e5ea09e349f1ba24cb20\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">5 billion<\/h3>\n\n\n<p class=\"has-deep-blue-color has-clear-teal-background-color has-text-color has-background has-link-color has-body-font-size wp-elements-c6407d4ac8c8c8cf84abfb685fe894eb wp-container-content-d5427a95 wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">5 billion emails screened daily on average to protect users from malware and phishing<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><div data-bi-ct=\"group\" class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-b5f8871a wp-block-group-is-layout-flow\"><h2 class=\"wp-block-heading has-body-3-xl-fluid-font-size\">Top recommendations from MDDR 2025<\/h2>\n\n\n<p class=\"has-body-font-size wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs)\">Based on the insights in our 2025 report, we share expert recommendations to help organizations and governments proactively address today&rsquo;s evolving cyber risks. Now is the time to take action.<\/p>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-layout-grid wp-container-core-group-is-layout-23ebd173 wp-block-group-is-layout-grid\" style=\"margin-top:var(--wp--preset--spacing--sm);padding-top:var(--wp--preset--spacing--md);padding-bottom:var(--wp--preset--spacing--md)\"><div data-bi-ct=\"group\" class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c4d06299 wp-block-group-is-layout-constrained\"><details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary data-bi-an=\"Top recommendations from MDDR 2025\" data-bi-cn=\"Toggle\" data-bi-ct=\"button\" data-bi-ecn=\"Toggle\" data-bi-ehn=\"Invest in people, not just tools\" data-bi-hn=\"Invest in people, not just tools\">Invest in people, not just tools<\/summary><p class=\"has-body-font-size wp-block-paragraph\">Continuously upskill your workforce and embed security in performance reviews. Culture and readiness&mdash;not just technology&mdash;are critical to an organization&rsquo;s defenses and its resilience.<\/p>\n<\/details>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c4d06299 wp-block-group-is-layout-constrained\"><details class=\"wp-block-details wp-container-content-69bc4bdf is-layout-flow wp-block-details-is-layout-flow\"><summary data-bi-an=\"Top recommendations from MDDR 2025\" data-bi-cn=\"Toggle\" data-bi-ct=\"button_toggled\" data-bi-ecn=\"Toggle\" data-bi-ehn=\"Build in resilience\" data-bi-hn=\"Build in resilience\">Build in resilience<\/summary><p class=\"has-body-font-size wp-block-paragraph\">Assume that breaches are inevitable and embed resilience into your infrastructure. To anticipate and prepare for disruptions, track metrics like multifactor authentication coverage, patch latency, and incident response time.<\/p>\n<\/details>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group wp-container-content-ab9b6df9 has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c4d06299 wp-block-group-is-layout-constrained\"><details class=\"wp-block-details wp-container-content-69bc4bdf is-layout-flow wp-block-details-is-layout-flow\"><summary data-bi-an=\"Top recommendations from MDDR 2025\" data-bi-cn=\"Toggle\" data-bi-ct=\"button_toggled\" data-bi-ecn=\"Toggle\" data-bi-ehn=\"Understand risks and benefits of AI\" data-bi-hn=\"Understand risks and benefits of AI\">Understand risks and benefits of AI<\/summary><p class=\"has-body-font-size wp-block-paragraph\">As adversaries move with the speed of AI, so must defenders. Adjust your risk planning and threat models and apply AI to strengthen your defensive tactics, such as threat and gap analytics, detection validation, and automatic remediation.<\/p>\n<\/details>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group wp-container-content-ab9b6df9 has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c4d06299 wp-block-group-is-layout-constrained\"><details class=\"wp-block-details wp-container-content-69bc4bdf is-layout-flow wp-block-details-is-layout-flow\"><summary data-bi-an=\"Top recommendations from MDDR 2025\" data-bi-cn=\"Toggle\" data-bi-ct=\"button_toggled\" data-bi-ecn=\"Toggle\" data-bi-ehn=\"Transition to quantum safety\" data-bi-hn=\"Transition to quantum safety\">Transition to quantum safety<\/summary><p class=\"has-body-font-size wp-block-paragraph\">Prepare for post-quantum cryptography by inventorying your encryption use and creating a plan to upgrade to modern standards as they evolve.<\/p>\n<\/details>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group wp-container-content-ab9b6df9 has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c4d06299 wp-block-group-is-layout-constrained\"><details class=\"wp-block-details wp-container-content-69bc4bdf is-layout-flow wp-block-details-is-layout-flow\"><summary data-bi-an=\"Top recommendations from MDDR 2025\" data-bi-cn=\"Toggle\" data-bi-ct=\"button_toggled\" data-bi-ecn=\"Toggle\" data-bi-ehn=\"Defend your perimeter\" data-bi-hn=\"Defend your perimeter\">Defend your perimeter<\/summary><p class=\"has-body-font-size wp-block-paragraph\">About a third of attackers use simple methods to break in, often through trusted partners in your supply chain or online services. Review all possible entry and access points and fix weaknesses.<\/p>\n<\/details>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group wp-container-content-ab9b6df9 has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c4d06299 wp-block-group-is-layout-constrained\"><details class=\"wp-block-details wp-container-content-69bc4bdf is-layout-flow wp-block-details-is-layout-flow\"><summary data-bi-an=\"Top recommendations from MDDR 2025\" data-bi-cn=\"Toggle\" data-bi-ct=\"button_toggled\" data-bi-ecn=\"Toggle\" data-bi-ehn=\"Collaborate across sectors\" data-bi-hn=\"Collaborate across sectors\">Collaborate across sectors<\/summary><p class=\"has-body-font-size wp-block-paragraph\">Public, private, nonprofit and academic cooperation is critical to manage cyber threats and emerging tech like AI. Develop joint policies, protocols, and initiatives, and share intelligence.<\/p>\n<\/details>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><div data-bi-ct=\"group\" class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-b5f8871a wp-block-group-is-layout-flow\"><h2 class=\"wp-block-heading has-body-3-xl-fluid-font-size\">Cyber threats: Worldwide customer impact<\/h2>\n\n\n<p class=\"has-body-font-size wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm)\">Most cyberattacks in 2025 were concentrated in particular countries. The United States (US), the United Kingdom (UK), Israel, and Germany were the leading targets of cyberattacks. Explore this interactive map to see how the most impacted countries compare to others in their region when it comes to cyber threats.<\/p>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-83e8ebfe wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs)\"><style>\n\n#microsoft-embed-3 {\n\t--width-desktop: 100%;\n\t--height-desktop: 400;\n\t--width-tablet: 100%;\n\t--height-tablet: 400;\n\t--width-mobile: 100%;\n\t--height-mobile: 400;\n}\n#microsoft-embed-3 { --aspect-ratio-desktop: 16\/9; }\n#microsoft-embed-3 { --aspect-ratio-tablet: 4\/3; }\n#microsoft-embed-3 { --aspect-ratio-mobile: 3\/5; }<\/style><div class=\"microsoft-embed-block wp-block-microsoft-embed-embed\" id=\"microsoft-embed-3\" data-auto-resize-height=\"false\">\n\t<iframe src=\"https:\/\/kind-desert-09ec5a40f.1.azurestaticapps.net\" frameborder=\"0\" allowfullscreen loading=\"lazy\" title=\"Threat map\"><\/iframe>\n<\/div>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">Source: Microsoft Threat Intelligence<br><em>This map pulls from data on how frequently customers are targeted by malicious activity in each country. The most impacted countries are compared to other countries in their region, both as a percentage of regional activity and a rank of regional activity.<\/em><\/p>\n<\/div>\n<\/section>\n\n\n<section data-bi-ct=\"group\" class=\"wp-block-group alignfull temp-toc-fix has-brown-black-color has-outlook-frost-gradient-background has-text-color has-background has-link-color microsoft-breakpoint-id-psurt96dd wp-elements-201650034251b33dbc2231eef4c4c5af has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" id=\"threat-overview\" style=\"padding-top:var(--wp--preset--spacing--2-xl-fluid);padding-bottom:var(--wp--preset--spacing--2-xl-fluid)\" data-microsoft-breakpoint-id=\"psurt96dd\"><div data-bi-ct=\"group\" class=\"wp-block-group alignwide is-style-sidebar-layout is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-d0b4a974 wp-block-group-is-layout-flex\"><div data-bi-ct=\"group\" class=\"wp-block-group microsoft-breakpoint-id-6aukwwgm5 has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" data-microsoft-breakpoint-id=\"6aukwwgm5\"><div data-bi-ct=\"group\" class=\"wp-block-group hide-mobile hide-tablet microsoft-breakpoint-id-hhqlbebw9 wp-container-content-29dca9c1 has-global-padding is-layout-constrained wp-block-group-is-layout-constrained wp-container-4 is-position-sticky wp-block-block\" data-microsoft-breakpoint-id=\"hhqlbebw9\"><div class=\"table-of-contents wp-block-microsoft-table-of-contents-table-of-contents\" data-wp-interactive=\"microsoft-table-of-contents\">\n\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f2e395\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#defense-report\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Microsoft DIgital Defense Report\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft DIgital Defense Report\">\n\t\t\t\tMicrosoft Digital Defense Report\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div style=\"--toc-item-color: #C6E3F3\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f2da5d\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#threat-overview\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Overview\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tOverview\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f2d907\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#threat-overview\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Threat landscape\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tThreat landscape\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n\n\t\t<\/div>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div style=\"--toc-item-color: #DCEDE8\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f2dd50\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#cybercrime\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Cybercrime\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tCybercrime\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f2dc80\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#cybercrime\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Cybercrime economy\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tCybercrime economy\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div style=\"--toc-item-color: #E2D9F1\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f2dfcb\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#ai-defense\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Artificial Intelligence\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tArtificial Intelligence\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f2df03\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#ai-defense\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"AI: Threat and tool\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tAI: Threat and tool\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div style=\"--toc-item-color: #FFD1C5\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f2e242\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#nation-state\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Nation-state\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tNation-state\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f2e180\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#nation-state\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Nation-state threat actors\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tNation-state threat actors\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f2e8ad\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#additional-reports\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Additional report topics\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Additional report topics\">\n\t\t\t\tAdditional report topics\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\n<div class=\"toc-item toc-item--level-0 has-icon wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f2e9a3\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"https:\/\/aka.ms\/mddrdownload\" class=\"toc-item__label\n\t\t\t\t\t\t\t\t\thas-icon\" target=\"_blank\" rel=\"noopener noreferrer\" data-bi-cn=\"Read the full report\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Read the full report\">\n\t\t\t\tRead the full report\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-3333c3a8 wp-block-group-is-layout-flex\"><ul class=\"wp-block-social-links has-small-icon-size has-icon-color has-icon-background-color is-layout-flex wp-container-core-social-links-is-layout-78e58421 wp-block-social-links-is-layout-flex\"><li style=\"color:#fff;background-color:#000;\" class=\"wp-social-link wp-social-link-linkedin has-white-color has-black-background-color wp-block-social-link\"><a data-bi-an=\"social media\" data-bi-ct=\"socialshare\" data-bi-ecn=\"Follow LinkedIn\" data-bi-ehn=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-socchn=\"LinkedIn\" rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-on-the-issues\" class=\"wp-block-social-link-anchor\" data-bi-cn=\"Follow LinkedIn\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n\n<li style=\"color:#fff;background-color:#000;\" class=\"wp-social-link wp-social-link-instagram has-white-color has-black-background-color wp-block-social-link\"><a data-bi-an=\"social media\" data-bi-ct=\"socialshare\" data-bi-ecn=\"Follow Instagram\" data-bi-ehn=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-socchn=\"Instagram\" rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.instagram.com\/msftissues\/\" class=\"wp-block-social-link-anchor\" data-bi-cn=\"Follow Instagram\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12,4.622c2.403,0,2.688,0.009,3.637,0.052c0.877,0.04,1.354,0.187,1.671,0.31c0.42,0.163,0.72,0.358,1.035,0.673 c0.315,0.315,0.51,0.615,0.673,1.035c0.123,0.317,0.27,0.794,0.31,1.671c0.043,0.949,0.052,1.234,0.052,3.637 s-0.009,2.688-0.052,3.637c-0.04,0.877-0.187,1.354-0.31,1.671c-0.163,0.42-0.358,0.72-0.673,1.035 c-0.315,0.315-0.615,0.51-1.035,0.673c-0.317,0.123-0.794,0.27-1.671,0.31c-0.949,0.043-1.233,0.052-3.637,0.052 s-2.688-0.009-3.637-0.052c-0.877-0.04-1.354-0.187-1.671-0.31c-0.42-0.163-0.72-0.358-1.035-0.673 c-0.315-0.315-0.51-0.615-0.673-1.035c-0.123-0.317-0.27-0.794-0.31-1.671C4.631,14.688,4.622,14.403,4.622,12 s0.009-2.688,0.052-3.637c0.04-0.877,0.187-1.354,0.31-1.671c0.163-0.42,0.358-0.72,0.673-1.035 c0.315-0.315,0.615-0.51,1.035-0.673c0.317-0.123,0.794-0.27,1.671-0.31C9.312,4.631,9.597,4.622,12,4.622 M12,3 C9.556,3,9.249,3.01,8.289,3.054C7.331,3.098,6.677,3.25,6.105,3.472C5.513,3.702,5.011,4.01,4.511,4.511 c-0.5,0.5-0.808,1.002-1.038,1.594C3.25,6.677,3.098,7.331,3.054,8.289C3.01,9.249,3,9.556,3,12c0,2.444,0.01,2.751,0.054,3.711 c0.044,0.958,0.196,1.612,0.418,2.185c0.23,0.592,0.538,1.094,1.038,1.594c0.5,0.5,1.002,0.808,1.594,1.038 c0.572,0.222,1.227,0.375,2.185,0.418C9.249,20.99,9.556,21,12,21s2.751-0.01,3.711-0.054c0.958-0.044,1.612-0.196,2.185-0.418 c0.592-0.23,1.094-0.538,1.594-1.038c0.5-0.5,0.808-1.002,1.038-1.594c0.222-0.572,0.375-1.227,0.418-2.185 C20.99,14.751,21,14.444,21,12s-0.01-2.751-0.054-3.711c-0.044-0.958-0.196-1.612-0.418-2.185c-0.23-0.592-0.538-1.094-1.038-1.594 c-0.5-0.5-1.002-0.808-1.594-1.038c-0.572-0.222-1.227-0.375-2.185-0.418C14.751,3.01,14.444,3,12,3L12,3z M12,7.378 c-2.552,0-4.622,2.069-4.622,4.622S9.448,16.622,12,16.622s4.622-2.069,4.622-4.622S14.552,7.378,12,7.378z M12,15 c-1.657,0-3-1.343-3-3s1.343-3,3-3s3,1.343,3,3S13.657,15,12,15z M16.804,6.116c-0.596,0-1.08,0.484-1.08,1.08 s0.484,1.08,1.08,1.08c0.596,0,1.08-0.484,1.08-1.08S17.401,6.116,16.804,6.116z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Instagram<\/span><\/a><\/li>\n\n\n<li style=\"color:#fff;background-color:#000;\" class=\"wp-social-link wp-social-link-x has-white-color has-black-background-color wp-block-social-link\"><a data-bi-an=\"social media\" data-bi-ct=\"socialshare\" data-bi-ecn=\"Follow X\" data-bi-ehn=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-socchn=\"X\" rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/msftissues\" class=\"wp-block-social-link-anchor\" data-bi-cn=\"Follow X\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13.982 10.622 20.54 3h-1.554l-5.693 6.618L8.745 3H3.5l6.876 10.007L3.5 21h1.554l6.012-6.989L15.868 21h5.245l-7.131-10.378Zm-2.128 2.474-.697-.997-5.543-7.93H8l4.474 6.4.697.996 5.815 8.318h-2.387l-4.745-6.787Z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">X<\/span><\/a><\/li>\n<\/ul>\n\n\n<figure class=\"wp-block-image size-full is-resized\" style=\"margin-top:7px\"><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/\" target=\"_blank\" rel=\" noreferrer noopener\" data-bi-cn=\"Microsoft On The Issues Blog\"><img decoding=\"async\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/themes\/microsoft-cela\/dist\/images\/icon-edit.png\" alt=\"Microsoft On The Issues Blog\" class=\"wp-image-442\" style=\"object-fit:contain;width:23px;height:22px\"><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group wp-container-content-9cfa9a5a has-global-padding is-layout-constrained wp-container-core-group-is-layout-3156e74c wp-block-group-is-layout-constrained\"><div data-bi-ct=\"group\" class=\"wp-block-group has-body-sm-font-size microsoft-breakpoint-id-mu39h65a4 is-content-justification-right is-nowrap is-layout-flex wp-container-core-group-is-layout-b897b800 wp-block-group-is-layout-flex\" style=\"font-style:normal;font-weight:600;letter-spacing:0.15em;line-height:1;text-transform:uppercase\" data-microsoft-breakpoint-id=\"mu39h65a4\"><p class=\"has-clear-blue-background-color has-background wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-right:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);padding-left:var(--wp--preset--spacing--xs)\">MDDR 2025 Report<\/p>\n\n\n<p class=\"has-light-blue-background-color has-background wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-right:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);padding-left:var(--wp--preset--spacing--xs)\">Overview<\/p>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-body-3-xl-fluid-font-size\">Threat landscape overview<\/h2>\n\n\n<p class=\"wp-block-paragraph\">Over the past year, threat actors quickly developed new techniques to circumvent cyber defenses, from AI-automated phishing to multi-stage attack chains. At the same time, most threats targeted known security gaps, such as web assets and remote services, with threat actors exploiting these vulnerabilities at a faster pace than ever before.<\/p>\n\n\n<h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-2-xl-fluid-font-size\">Attacks by sector<\/h3>\n\n\n<p class=\"wp-block-paragraph\">Most cyberattacks targeted industries with vast amounts of sensitive data, including government agencies and research and academia. Below are the sectors most impacted by cyber threats in 2025.<\/p>\n\n\n<figure class=\"wp-block-image size-large block-visibility-hide-large-screen block-visibility-hide-medium-screen\"><img decoding=\"async\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/10\/GRAPH_1_MOBILE-555x1024.webp\" alt=\"Attacks by sector data\" class=\"wp-image-2346\"><figcaption class=\"wp-element-caption\">Source: Microsoft Threat Intelligence<\/figcaption><\/figure>\n\n\n<figure class=\"wp-block-image size-full block-visibility-hide-small-screen\"><img decoding=\"async\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/10\/GRAPH_1_DESKTOP-scaled-e1760463527724.webp\" alt=\"Attacks by sector data\" class=\"wp-image-2348\"><figcaption class=\"wp-element-caption\">Source: Microsoft Threat Intelligence<\/figcaption><\/figure>\n\n\n<h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-2-xl-fluid-font-size\">Attack motivations<\/h3>\n\n\n<p class=\"wp-block-paragraph\">Attacks are by and large financially motivated: extortion, ransomware, and data theft are primary attack motivations. Espionage accounts for only 4% of attacks. Below are the most common motivations behind cyberattacks, when identifiable.<\/p>\n\n\n<figure class=\"wp-block-image size-full block-visibility-hide-large-screen block-visibility-hide-medium-screen\"><img decoding=\"async\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/10\/GRAPH_2_MOBILE-scaled-e1760463734111.webp\" alt=\"Threat attack motivations data\" class=\"wp-image-2350\"><figcaption class=\"wp-element-caption\">Source: Microsoft Incident Response<\/figcaption><\/figure>\n\n\n<figure class=\"wp-block-image size-full block-visibility-hide-small-screen\"><img decoding=\"async\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/10\/GRAPH_2_DESKTOP_updated-scaled.png\" alt=\"Threat attack motivations data\" class=\"wp-image-2352\"><figcaption class=\"wp-element-caption\">Source: Microsoft Incident Response<\/figcaption><\/figure>\n<\/div>\n<\/div>\n<\/section>\n\n\n<section data-bi-ct=\"group\" class=\"wp-block-group alignfull has-brown-black-color has-excel-breeze-gradient-background has-text-color has-background has-link-color wp-elements-d6292d88f64f76786a4cb5d0d4f54008 has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" id=\"cybercrime\" style=\"padding-top:var(--wp--preset--spacing--2-xl-fluid);padding-bottom:var(--wp--preset--spacing--2-xl-fluid)\"><div data-bi-ct=\"group\" class=\"wp-block-group alignwide is-style-sidebar-layout is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-d0b4a974 wp-block-group-is-layout-flex\"><div data-bi-ct=\"group\" class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><div data-bi-ct=\"group\" class=\"wp-block-group hide-mobile hide-tablet microsoft-breakpoint-id-hhqlbebw9 wp-container-content-29dca9c1 has-global-padding is-layout-constrained wp-block-group-is-layout-constrained wp-container-5 is-position-sticky wp-block-block\" data-microsoft-breakpoint-id=\"hhqlbebw9\"><div class=\"table-of-contents wp-block-microsoft-table-of-contents-table-of-contents\" data-wp-interactive=\"microsoft-table-of-contents\">\n\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f34d4f\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#defense-report\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Microsoft DIgital Defense Report\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft DIgital Defense Report\">\n\t\t\t\tMicrosoft Digital Defense Report\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div style=\"--toc-item-color: #C6E3F3\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f34460\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#threat-overview\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Overview\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tOverview\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f3435d\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#threat-overview\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Threat landscape\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tThreat landscape\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n\n\t\t<\/div>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div style=\"--toc-item-color: #DCEDE8\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f34710\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#cybercrime\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Cybercrime\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tCybercrime\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f34645\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#cybercrime\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Cybercrime economy\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tCybercrime economy\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div style=\"--toc-item-color: #E2D9F1\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f34984\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#ai-defense\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Artificial Intelligence\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tArtificial Intelligence\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f348c0\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#ai-defense\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"AI: Threat and tool\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tAI: Threat and tool\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div style=\"--toc-item-color: #FFD1C5\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f34bf3\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#nation-state\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Nation-state\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tNation-state\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f34b33\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#nation-state\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Nation-state threat actors\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tNation-state threat actors\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f35293\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#additional-reports\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Additional report topics\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Additional report topics\">\n\t\t\t\tAdditional report topics\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\n<div class=\"toc-item toc-item--level-0 has-icon wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f35390\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"https:\/\/aka.ms\/mddrdownload\" class=\"toc-item__label\n\t\t\t\t\t\t\t\t\thas-icon\" target=\"_blank\" rel=\"noopener noreferrer\" data-bi-cn=\"Read the full report\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Read the full report\">\n\t\t\t\tRead the full report\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-3333c3a8 wp-block-group-is-layout-flex\"><ul class=\"wp-block-social-links has-small-icon-size has-icon-color has-icon-background-color is-layout-flex wp-container-core-social-links-is-layout-78e58421 wp-block-social-links-is-layout-flex\"><li style=\"color:#fff;background-color:#000;\" class=\"wp-social-link wp-social-link-linkedin has-white-color has-black-background-color wp-block-social-link\"><a data-bi-an=\"social media\" data-bi-ct=\"socialshare\" data-bi-ecn=\"Follow LinkedIn\" data-bi-ehn=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-socchn=\"LinkedIn\" rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-on-the-issues\" class=\"wp-block-social-link-anchor\" data-bi-cn=\"Follow LinkedIn\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n\n<li style=\"color:#fff;background-color:#000;\" class=\"wp-social-link wp-social-link-instagram has-white-color has-black-background-color wp-block-social-link\"><a data-bi-an=\"social media\" data-bi-ct=\"socialshare\" data-bi-ecn=\"Follow Instagram\" data-bi-ehn=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-socchn=\"Instagram\" rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.instagram.com\/msftissues\/\" class=\"wp-block-social-link-anchor\" data-bi-cn=\"Follow Instagram\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12,4.622c2.403,0,2.688,0.009,3.637,0.052c0.877,0.04,1.354,0.187,1.671,0.31c0.42,0.163,0.72,0.358,1.035,0.673 c0.315,0.315,0.51,0.615,0.673,1.035c0.123,0.317,0.27,0.794,0.31,1.671c0.043,0.949,0.052,1.234,0.052,3.637 s-0.009,2.688-0.052,3.637c-0.04,0.877-0.187,1.354-0.31,1.671c-0.163,0.42-0.358,0.72-0.673,1.035 c-0.315,0.315-0.615,0.51-1.035,0.673c-0.317,0.123-0.794,0.27-1.671,0.31c-0.949,0.043-1.233,0.052-3.637,0.052 s-2.688-0.009-3.637-0.052c-0.877-0.04-1.354-0.187-1.671-0.31c-0.42-0.163-0.72-0.358-1.035-0.673 c-0.315-0.315-0.51-0.615-0.673-1.035c-0.123-0.317-0.27-0.794-0.31-1.671C4.631,14.688,4.622,14.403,4.622,12 s0.009-2.688,0.052-3.637c0.04-0.877,0.187-1.354,0.31-1.671c0.163-0.42,0.358-0.72,0.673-1.035 c0.315-0.315,0.615-0.51,1.035-0.673c0.317-0.123,0.794-0.27,1.671-0.31C9.312,4.631,9.597,4.622,12,4.622 M12,3 C9.556,3,9.249,3.01,8.289,3.054C7.331,3.098,6.677,3.25,6.105,3.472C5.513,3.702,5.011,4.01,4.511,4.511 c-0.5,0.5-0.808,1.002-1.038,1.594C3.25,6.677,3.098,7.331,3.054,8.289C3.01,9.249,3,9.556,3,12c0,2.444,0.01,2.751,0.054,3.711 c0.044,0.958,0.196,1.612,0.418,2.185c0.23,0.592,0.538,1.094,1.038,1.594c0.5,0.5,1.002,0.808,1.594,1.038 c0.572,0.222,1.227,0.375,2.185,0.418C9.249,20.99,9.556,21,12,21s2.751-0.01,3.711-0.054c0.958-0.044,1.612-0.196,2.185-0.418 c0.592-0.23,1.094-0.538,1.594-1.038c0.5-0.5,0.808-1.002,1.038-1.594c0.222-0.572,0.375-1.227,0.418-2.185 C20.99,14.751,21,14.444,21,12s-0.01-2.751-0.054-3.711c-0.044-0.958-0.196-1.612-0.418-2.185c-0.23-0.592-0.538-1.094-1.038-1.594 c-0.5-0.5-1.002-0.808-1.594-1.038c-0.572-0.222-1.227-0.375-2.185-0.418C14.751,3.01,14.444,3,12,3L12,3z M12,7.378 c-2.552,0-4.622,2.069-4.622,4.622S9.448,16.622,12,16.622s4.622-2.069,4.622-4.622S14.552,7.378,12,7.378z M12,15 c-1.657,0-3-1.343-3-3s1.343-3,3-3s3,1.343,3,3S13.657,15,12,15z M16.804,6.116c-0.596,0-1.08,0.484-1.08,1.08 s0.484,1.08,1.08,1.08c0.596,0,1.08-0.484,1.08-1.08S17.401,6.116,16.804,6.116z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Instagram<\/span><\/a><\/li>\n\n\n<li style=\"color:#fff;background-color:#000;\" class=\"wp-social-link wp-social-link-x has-white-color has-black-background-color wp-block-social-link\"><a data-bi-an=\"social media\" data-bi-ct=\"socialshare\" data-bi-ecn=\"Follow X\" data-bi-ehn=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-socchn=\"X\" rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/msftissues\" class=\"wp-block-social-link-anchor\" data-bi-cn=\"Follow X\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13.982 10.622 20.54 3h-1.554l-5.693 6.618L8.745 3H3.5l6.876 10.007L3.5 21h1.554l6.012-6.989L15.868 21h5.245l-7.131-10.378Zm-2.128 2.474-.697-.997-5.543-7.93H8l4.474 6.4.697.996 5.815 8.318h-2.387l-4.745-6.787Z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">X<\/span><\/a><\/li>\n<\/ul>\n\n\n<figure class=\"wp-block-image size-full is-resized\" style=\"margin-top:7px\"><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/\" target=\"_blank\" rel=\" noreferrer noopener\" data-bi-cn=\"Microsoft On The Issues Blog\"><img decoding=\"async\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/themes\/microsoft-cela\/dist\/images\/icon-edit.png\" alt=\"Microsoft On The Issues Blog\" class=\"wp-image-442\" style=\"object-fit:contain;width:23px;height:22px\"><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group wp-container-content-9cfa9a5a has-global-padding is-layout-constrained wp-container-core-group-is-layout-3156e74c wp-block-group-is-layout-constrained\"><div data-bi-ct=\"group\" class=\"wp-block-group has-body-sm-font-size microsoft-breakpoint-id-r27xo8m32 is-content-justification-right is-nowrap is-layout-flex wp-container-core-group-is-layout-b897b800 wp-block-group-is-layout-flex\" style=\"font-style:normal;font-weight:600;letter-spacing:0.15em;line-height:1;text-transform:uppercase\" data-microsoft-breakpoint-id=\"r27xo8m32\"><p class=\"has-clear-teal-background-color has-background wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-right:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);padding-left:var(--wp--preset--spacing--xs)\">MDDR 2025 Report<\/p>\n\n\n<p class=\"has-light-teal-background-color has-background wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-right:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);padding-left:var(--wp--preset--spacing--xs)\">Cybercrime<\/p>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-body-3-xl-fluid-font-size\">Cybercrime economy<\/h2>\n\n\n<p class=\"wp-block-paragraph\">The cybercrime economy is an increasingly specialized and intricate ecosystem made up of access brokers, ransomware operators, and data extortion groups. As financial incentives increase across the cybercrime-as-a-service (CaaS) model and international borders obscure criminal networks, it can be difficult for governments and organizations to disrupt the cybercrime economy.<\/p>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-50e0938b wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--md);padding-bottom:var(--wp--preset--spacing--md)\"><div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><div data-bi-ct=\"group\" class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-b5f8871a wp-block-group-is-layout-flow\"><h3 class=\"wp-block-heading has-dark-teal-color has-text-color has-link-color has-body-2-xl-fluid-font-size wp-elements-f3cf9965c490731a949a7b8d762749bd\" style=\"border-bottom-color:var(--wp--preset--color--brown-black);border-bottom-width:2px;padding-bottom:var(--wp--preset--spacing--sm)\">$10,000 vs $100,000<\/h3>\n\n\n<p class=\"has-body-font-size wp-block-paragraph\">A security researcher may earn $10,000 for responsibly disclosing a vulnerability to a bug bounty program but may earn over $100,000 by selling the same exploit to a cyber mercenary.<\/p>\n<\/div>\n<\/div>\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><div data-bi-ct=\"group\" class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-b5f8871a wp-block-group-is-layout-flow\"><h3 class=\"wp-block-heading has-dark-teal-color has-text-color has-link-color has-body-2-xl-fluid-font-size wp-elements-a0bf729fce6714582f7e9ae78762de79\" style=\"border-bottom-color:var(--wp--preset--color--brown-black);border-bottom-width:2px;padding-bottom:var(--wp--preset--spacing--sm)\">97%<\/h3>\n\n\n<p class=\"has-body-font-size wp-block-paragraph\">97% of identity attacks were password spray attacks. Even as more sophisticated tactics evolve, most identity attackers exploit the common problem of weak and overused passwords.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-2-xl-fluid-font-size\">Lumma Stealer<\/h3>\n\n\n<p class=\"wp-block-paragraph\">Lumma Stealer was the most prevalent infostealer observed between October 2024 and October 2025. A sophisticated malware-as-a-service (MaaS) platform, Lumma Stealer can retrieve sensitive data from various browsers and applications, such as cryptocurrency wallets. This data is then sold to access brokers through dark web forums and Telegram channels. Ultimately, other cyber criminals like ransomware operators can use the data to access target networks.<\/p>\n\n\n<p class=\"wp-block-paragraph\">In mid-2025, Microsoft&rsquo;s Digital Crimes Unit, working with the U.S. Department of Justice, Europol, and Japan&rsquo;s Cybercrime Control Center, carried out a landmark disruption operation against Lumma Stealer. Over 2,300 malicious domains were seized or blocked, cutting off Lumma&rsquo;s infrastructure and redirecting infected devices away from criminal control.<\/p>\n\n\n<figure class=\"wp-block-image size-large block-visibility-hide-large-screen block-visibility-hide-medium-screen\"><img decoding=\"async\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/10\/GRAPH_3_MOBILE-1-e1760475399166-1024x866.webp\" alt=\"Lumma prevalence before disruption map of the world\" class=\"wp-image-2375\"><figcaption class=\"wp-element-caption\">Source: Lumma pre-disruption data, Microsoft Digital Crimes Unit<\/figcaption><\/figure>\n\n\n<figure class=\"wp-block-image size-large block-visibility-hide-small-screen\"><img decoding=\"async\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/10\/GRAPH_3_DESKTOP-1-scaled-e1760475440943-1024x712.webp\" alt=\"Lumma prevalence before disruption map of the world\" class=\"wp-image-2376\"><figcaption class=\"wp-element-caption\">Source: Lumma pre-disruption data, Microsoft Digital Crimes Unit<\/figcaption><\/figure>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm)\"><div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a data-bi-an=\"Cybercrime economy\" data-bi-ct=\"link\" data-bi-ehn=\"Lumma Stealer\" data-bi-hn=\"Lumma Stealer\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=64\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Read case study\">Read case study<svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" style=\"width: 1em;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group has-minted-azure-background-color has-background microsoft-breakpoint-id-6iiatu5kd has-global-padding is-layout-constrained wp-container-core-group-is-layout-7a813059 wp-block-group-is-layout-constrained\" style=\"padding-top:24px;padding-right:24px;padding-bottom:24px;padding-left:24px\" data-microsoft-breakpoint-id=\"6iiatu5kd\"><div data-bi-ct=\"group\" class=\"wp-block-group callout-block microsoft-breakpoint-id-bh9av1206 is-layout-flex wp-container-core-group-is-layout-32bd0a23 wp-block-group-is-layout-flex\" style=\"border-bottom-color:var(--wp--preset--color--deep-blue);border-bottom-width:2px;padding-bottom:var(--wp--preset--spacing--xs)\" data-microsoft-breakpoint-id=\"bh9av1206\"><div data-bi-ct=\"group\" class=\"wp-block-group callout__icon-container has-clear-teal-background-color has-background microsoft-breakpoint-id-cgsz714u6 wp-container-content-8ca190d9 has-global-padding is-layout-constrained wp-container-core-group-is-layout-86152876 wp-block-group-is-layout-constrained\" style=\"padding-top:6px;padding-right:6px;padding-bottom:6px;padding-left:6px\" data-microsoft-breakpoint-id=\"cgsz714u6\"><figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/themes\/microsoft-cela\/dist\/images\/icon-cycle.png\" alt=\"\" style=\"object-fit:contain;width:60px;height:60px\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-body-2-xl-fluid-font-size wp-container-content-9cfa9a5a\">Enable cross-border legal operations<\/h3>\n<\/div>\n\n\n<p class=\"has-body-font-size wp-block-paragraph\">Policymakers should promote harmonized cross-border legal frameworks, tools, and tactics to enable faster cybercrime disruptions.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n<section data-bi-ct=\"group\" class=\"wp-block-group alignfull has-brown-black-color has-azure-paper-gradient-background has-text-color has-background has-link-color wp-elements-72d1abd9185f8fdc3ecb040151eff755 has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" id=\"ai-defense\" style=\"padding-top:var(--wp--preset--spacing--2-xl-fluid);padding-bottom:var(--wp--preset--spacing--2-xl-fluid)\"><div data-bi-ct=\"group\" class=\"wp-block-group alignwide is-style-sidebar-layout is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-d0b4a974 wp-block-group-is-layout-flex\"><div data-bi-ct=\"group\" class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><div data-bi-ct=\"group\" class=\"wp-block-group hide-mobile hide-tablet microsoft-breakpoint-id-hhqlbebw9 wp-container-content-29dca9c1 has-global-padding is-layout-constrained wp-block-group-is-layout-constrained wp-container-6 is-position-sticky wp-block-block\" data-microsoft-breakpoint-id=\"hhqlbebw9\"><div class=\"table-of-contents wp-block-microsoft-table-of-contents-table-of-contents\" data-wp-interactive=\"microsoft-table-of-contents\">\n\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f3c081\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#defense-report\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Microsoft DIgital Defense Report\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft DIgital Defense Report\">\n\t\t\t\tMicrosoft Digital Defense Report\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div style=\"--toc-item-color: #C6E3F3\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f3b765\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#threat-overview\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Overview\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tOverview\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f3b65f\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#threat-overview\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Threat landscape\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tThreat landscape\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n\n\t\t<\/div>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div style=\"--toc-item-color: #DCEDE8\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f3ba11\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#cybercrime\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Cybercrime\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tCybercrime\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f3b948\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#cybercrime\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Cybercrime economy\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tCybercrime economy\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div style=\"--toc-item-color: #E2D9F1\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f3bcb2\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#ai-defense\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Artificial Intelligence\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tArtificial Intelligence\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f3bbd6\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#ai-defense\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"AI: Threat and tool\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tAI: Threat and tool\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div style=\"--toc-item-color: #FFD1C5\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f3bf23\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#nation-state\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Nation-state\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tNation-state\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f3be65\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#nation-state\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Nation-state threat actors\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tNation-state threat actors\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f3c59a\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#additional-reports\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Additional report topics\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Additional report topics\">\n\t\t\t\tAdditional report topics\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\n<div class=\"toc-item toc-item--level-0 has-icon wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f3c699\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"https:\/\/aka.ms\/mddrdownload\" class=\"toc-item__label\n\t\t\t\t\t\t\t\t\thas-icon\" target=\"_blank\" rel=\"noopener noreferrer\" data-bi-cn=\"Read the full report\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Read the full report\">\n\t\t\t\tRead the full report\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-3333c3a8 wp-block-group-is-layout-flex\"><ul class=\"wp-block-social-links has-small-icon-size has-icon-color has-icon-background-color is-layout-flex wp-container-core-social-links-is-layout-78e58421 wp-block-social-links-is-layout-flex\"><li style=\"color:#fff;background-color:#000;\" class=\"wp-social-link wp-social-link-linkedin has-white-color has-black-background-color wp-block-social-link\"><a data-bi-an=\"social media\" data-bi-ct=\"socialshare\" data-bi-ecn=\"Follow LinkedIn\" data-bi-ehn=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-socchn=\"LinkedIn\" rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-on-the-issues\" class=\"wp-block-social-link-anchor\" data-bi-cn=\"Follow LinkedIn\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n\n<li style=\"color:#fff;background-color:#000;\" class=\"wp-social-link wp-social-link-instagram has-white-color has-black-background-color wp-block-social-link\"><a data-bi-an=\"social media\" data-bi-ct=\"socialshare\" data-bi-ecn=\"Follow Instagram\" data-bi-ehn=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-socchn=\"Instagram\" rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.instagram.com\/msftissues\/\" class=\"wp-block-social-link-anchor\" data-bi-cn=\"Follow Instagram\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12,4.622c2.403,0,2.688,0.009,3.637,0.052c0.877,0.04,1.354,0.187,1.671,0.31c0.42,0.163,0.72,0.358,1.035,0.673 c0.315,0.315,0.51,0.615,0.673,1.035c0.123,0.317,0.27,0.794,0.31,1.671c0.043,0.949,0.052,1.234,0.052,3.637 s-0.009,2.688-0.052,3.637c-0.04,0.877-0.187,1.354-0.31,1.671c-0.163,0.42-0.358,0.72-0.673,1.035 c-0.315,0.315-0.615,0.51-1.035,0.673c-0.317,0.123-0.794,0.27-1.671,0.31c-0.949,0.043-1.233,0.052-3.637,0.052 s-2.688-0.009-3.637-0.052c-0.877-0.04-1.354-0.187-1.671-0.31c-0.42-0.163-0.72-0.358-1.035-0.673 c-0.315-0.315-0.51-0.615-0.673-1.035c-0.123-0.317-0.27-0.794-0.31-1.671C4.631,14.688,4.622,14.403,4.622,12 s0.009-2.688,0.052-3.637c0.04-0.877,0.187-1.354,0.31-1.671c0.163-0.42,0.358-0.72,0.673-1.035 c0.315-0.315,0.615-0.51,1.035-0.673c0.317-0.123,0.794-0.27,1.671-0.31C9.312,4.631,9.597,4.622,12,4.622 M12,3 C9.556,3,9.249,3.01,8.289,3.054C7.331,3.098,6.677,3.25,6.105,3.472C5.513,3.702,5.011,4.01,4.511,4.511 c-0.5,0.5-0.808,1.002-1.038,1.594C3.25,6.677,3.098,7.331,3.054,8.289C3.01,9.249,3,9.556,3,12c0,2.444,0.01,2.751,0.054,3.711 c0.044,0.958,0.196,1.612,0.418,2.185c0.23,0.592,0.538,1.094,1.038,1.594c0.5,0.5,1.002,0.808,1.594,1.038 c0.572,0.222,1.227,0.375,2.185,0.418C9.249,20.99,9.556,21,12,21s2.751-0.01,3.711-0.054c0.958-0.044,1.612-0.196,2.185-0.418 c0.592-0.23,1.094-0.538,1.594-1.038c0.5-0.5,0.808-1.002,1.038-1.594c0.222-0.572,0.375-1.227,0.418-2.185 C20.99,14.751,21,14.444,21,12s-0.01-2.751-0.054-3.711c-0.044-0.958-0.196-1.612-0.418-2.185c-0.23-0.592-0.538-1.094-1.038-1.594 c-0.5-0.5-1.002-0.808-1.594-1.038c-0.572-0.222-1.227-0.375-2.185-0.418C14.751,3.01,14.444,3,12,3L12,3z M12,7.378 c-2.552,0-4.622,2.069-4.622,4.622S9.448,16.622,12,16.622s4.622-2.069,4.622-4.622S14.552,7.378,12,7.378z M12,15 c-1.657,0-3-1.343-3-3s1.343-3,3-3s3,1.343,3,3S13.657,15,12,15z M16.804,6.116c-0.596,0-1.08,0.484-1.08,1.08 s0.484,1.08,1.08,1.08c0.596,0,1.08-0.484,1.08-1.08S17.401,6.116,16.804,6.116z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Instagram<\/span><\/a><\/li>\n\n\n<li style=\"color:#fff;background-color:#000;\" class=\"wp-social-link wp-social-link-x has-white-color has-black-background-color wp-block-social-link\"><a data-bi-an=\"social media\" data-bi-ct=\"socialshare\" data-bi-ecn=\"Follow X\" data-bi-ehn=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-socchn=\"X\" rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/msftissues\" class=\"wp-block-social-link-anchor\" data-bi-cn=\"Follow X\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13.982 10.622 20.54 3h-1.554l-5.693 6.618L8.745 3H3.5l6.876 10.007L3.5 21h1.554l6.012-6.989L15.868 21h5.245l-7.131-10.378Zm-2.128 2.474-.697-.997-5.543-7.93H8l4.474 6.4.697.996 5.815 8.318h-2.387l-4.745-6.787Z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">X<\/span><\/a><\/li>\n<\/ul>\n\n\n<figure class=\"wp-block-image size-full is-resized\" style=\"margin-top:7px\"><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/\" target=\"_blank\" rel=\" noreferrer noopener\" data-bi-cn=\"Microsoft On The Issues Blog\"><img decoding=\"async\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/themes\/microsoft-cela\/dist\/images\/icon-edit.png\" alt=\"Microsoft On The Issues Blog\" class=\"wp-image-442\" style=\"object-fit:contain;width:23px;height:22px\"><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group wp-container-content-9cfa9a5a has-global-padding is-layout-constrained wp-container-core-group-is-layout-3156e74c wp-block-group-is-layout-constrained\"><div data-bi-ct=\"group\" class=\"wp-block-group has-body-sm-font-size microsoft-breakpoint-id-uklyu7cpk is-content-justification-right is-nowrap is-layout-flex wp-container-core-group-is-layout-b897b800 wp-block-group-is-layout-flex\" style=\"font-style:normal;font-weight:600;letter-spacing:0.15em;line-height:1;text-transform:uppercase\" data-microsoft-breakpoint-id=\"uklyu7cpk\"><p class=\"has-clear-purple-background-color has-background wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--xs);padding-left:var(--wp--preset--spacing--sm)\">MDDR 2025 Report<\/p>\n\n\n<p class=\"has-light-purple-background-color has-background wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-right:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);padding-left:var(--wp--preset--spacing--xs)\">AI<\/p>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-body-3-xl-fluid-font-size\" style=\"padding-top:0;padding-bottom:0\">AI: A tool, threat, and vulnerability<\/h2>\n\n\n<p class=\"wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs)\">Both adversaries and defenders are using AI to make their operations more effective and efficient, rendering the technology a cybersecurity risk and tool at once.<\/p>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a7bbfd1e wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs)\"><div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><div data-bi-ct=\"group\" class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-b5f8871a wp-block-group-is-layout-flow\"><h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-2-xl-fluid-font-size\" style=\"border-bottom-color:var(--wp--preset--color--brown-black);border-bottom-width:2px;padding-bottom:var(--wp--preset--spacing--sm)\">AI and defenders<\/h3>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-a77db08e wp-block-group-is-layout-flow\"><div data-bi-ct=\"group\" class=\"wp-block-group has-hover-background is-layout-flow wp-block-group-is-layout-flow\" style=\"min-height:210px;padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm);--hover-background-color:#DCEDE8\"><h4 class=\"wp-block-heading has-segoe-sans-font-family has-body-xl-fluid-font-size\">AI in threat analysis<\/h4>\n\n\n<p class=\"has-body-font-size wp-block-paragraph\">AI models can scan vast amounts of threat intelligence data to detect early warning signs, helping defenders disrupt attacks before they escalate.<\/p>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group has-hover-background is-layout-flow wp-block-group-is-layout-flow\" style=\"min-height:210px;padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm);--hover-background-color:#DCEDE8\"><h4 class=\"wp-block-heading has-segoe-sans-font-family has-body-xl-fluid-font-size\">AI for identifying gaps<\/h4>\n\n\n<p class=\"wp-block-paragraph\">AI can compare known threats with existing protections, revealing vulnerabilities and directing security resources.<\/p>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group has-hover-background is-layout-flow wp-block-group-is-layout-flow\" style=\"min-height:210px;padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm);--hover-background-color:#DCEDE8\"><h4 class=\"wp-block-heading has-segoe-sans-font-family has-body-xl-fluid-font-size\">Automated response<\/h4>\n\n\n<p class=\"wp-block-paragraph\">AI agents can act within seconds of a suspected threat, suspending accounts, initiating password resets, and notifying administrators.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><div data-bi-ct=\"group\" class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-b5f8871a wp-block-group-is-layout-flow\"><h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-2-xl-fluid-font-size\" style=\"border-bottom-color:var(--wp--preset--color--brown-black);border-bottom-width:2px;padding-bottom:var(--wp--preset--spacing--sm)\">AI and adversaries<\/h3>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-a77db08e wp-block-group-is-layout-flow\"><div data-bi-ct=\"group\" class=\"wp-block-group has-hover-background is-layout-flow wp-block-group-is-layout-flow\" style=\"min-height:210px;padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm);--hover-background-color:#FFD1C5\"><h4 class=\"wp-block-heading has-segoe-sans-font-family has-body-xl-fluid-font-size\">AI as a vulnerability<\/h4>\n\n\n<p class=\"has-body-font-size wp-block-paragraph\">Attackers are compromising improperly secured AI workloads through prompt-based attacks and supply chain exploits, tricking models into executing unauthorized actions.<\/p>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group has-hover-background is-layout-flow wp-block-group-is-layout-flow\" style=\"min-height:210px;padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm);--hover-background-color:#FFD1C5\"><h4 class=\"wp-block-heading has-segoe-sans-font-family has-body-xl-fluid-font-size\">Deepfake fraud<\/h4>\n\n\n<p class=\"wp-block-paragraph\">Synthetic media&ndash;such as voice cloning and deepfake videos&ndash;target multinational companies and government organizations, gaining access to sensitive information and costing millions.<\/p>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group has-hover-background is-layout-flow wp-block-group-is-layout-flow\" style=\"min-height:210px;padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm);--hover-background-color:#FFD1C5\"><h4 class=\"wp-block-heading has-segoe-sans-font-family has-body-xl-fluid-font-size\">Automated attacks<\/h4>\n\n\n<p class=\"wp-block-paragraph\">AI agents could allow threat actors to automate the entire attack lifecycle through chain reconnaissance, vulnerability scanning, and exploitation at scale.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group has-light-purple-background-color has-background microsoft-breakpoint-id-o94dwhy6c has-global-padding is-layout-constrained wp-container-core-group-is-layout-7a813059 wp-block-group-is-layout-constrained\" style=\"padding-top:24px;padding-right:24px;padding-bottom:24px;padding-left:24px\" data-microsoft-breakpoint-id=\"o94dwhy6c\"><div data-bi-ct=\"group\" class=\"wp-block-group callout-block microsoft-breakpoint-id-lhhlmv83k is-layout-flex wp-container-core-group-is-layout-32bd0a23 wp-block-group-is-layout-flex\" style=\"border-bottom-color:var(--wp--preset--color--deep-blue);border-bottom-width:2px;padding-bottom:var(--wp--preset--spacing--xs)\" data-microsoft-breakpoint-id=\"lhhlmv83k\"><div data-bi-ct=\"group\" class=\"wp-block-group callout__icon-container has-clear-purple-background-color has-background microsoft-breakpoint-id-akg5h259t wp-container-content-8ca190d9 is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:6px;padding-right:6px;padding-bottom:6px;padding-left:6px\" data-microsoft-breakpoint-id=\"akg5h259t\"><figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/themes\/microsoft-cela\/dist\/images\/icon-research.png\" alt=\"\" class=\"wp-image-344\" style=\"object-fit:contain;width:60px;height:60px\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-body-2-xl-fluid-font-size wp-container-content-3b6d6715\">Invest in AI research and development<\/h3>\n<\/div>\n\n\n<p class=\"has-body-font-size wp-block-paragraph\">Governments should invest in research and development projects that specifically apply AI to cybersecurity technology.<\/p>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-2-xl-fluid-font-size\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs)\">Storm-2139: A tale of AI abuse<\/h3>\n\n\n<p class=\"wp-block-paragraph\">In July 2024, Microsoft uncovered a global network exploiting stolen API keys to bypass AI safety controls and generate abusive AI-generated images. Using content provenance tools and open-source intelligence, the DCU traced the operation and referred the criminals to governments.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"padding-top:0;padding-bottom:0\"><div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a data-bi-an=\"AI: A tool, threat, and vulnerability\" data-bi-ct=\"link\" data-bi-ehn=\"torm-2139: A tale of AI abuse\" data-bi-hn=\"torm-2139: A tale of AI abuse\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=56\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Read case study\">Read case study<svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" style=\"width: 1em;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n<section data-bi-ct=\"group\" class=\"wp-block-group alignfull has-brown-black-color has-mica-blush-gradient-background has-text-color has-background has-link-color wp-elements-c467a9e7da8bcfbc2378d3fdb0486cc0 has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" id=\"nation-state\" style=\"padding-top:var(--wp--preset--spacing--2-xl-fluid);padding-bottom:var(--wp--preset--spacing--2-xl-fluid)\"><div data-bi-ct=\"group\" class=\"wp-block-group alignwide is-style-sidebar-layout is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-d0b4a974 wp-block-group-is-layout-flex\"><div data-bi-ct=\"group\" class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><div data-bi-ct=\"group\" class=\"wp-block-group hide-mobile hide-tablet microsoft-breakpoint-id-hhqlbebw9 wp-container-content-29dca9c1 has-global-padding is-layout-constrained wp-block-group-is-layout-constrained wp-container-7 is-position-sticky wp-block-block\" data-microsoft-breakpoint-id=\"hhqlbebw9\"><div class=\"table-of-contents wp-block-microsoft-table-of-contents-table-of-contents\" data-wp-interactive=\"microsoft-table-of-contents\">\n\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f43f01\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#defense-report\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Microsoft DIgital Defense Report\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft DIgital Defense Report\">\n\t\t\t\tMicrosoft Digital Defense Report\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div style=\"--toc-item-color: #C6E3F3\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f435c9\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#threat-overview\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Overview\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tOverview\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f434b5\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#threat-overview\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Threat landscape\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tThreat landscape\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n\n\t\t<\/div>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div style=\"--toc-item-color: #DCEDE8\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f43884\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#cybercrime\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Cybercrime\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tCybercrime\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f437b1\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#cybercrime\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Cybercrime economy\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tCybercrime economy\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div style=\"--toc-item-color: #E2D9F1\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f43b22\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#ai-defense\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Artificial Intelligence\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tArtificial Intelligence\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f43a5b\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#ai-defense\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"AI: Threat and tool\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tAI: Threat and tool\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div style=\"--toc-item-color: #FFD1C5\" class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f43d9f\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#nation-state\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Nation-state\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tNation-state\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"toc-item__content\">\n\t\t\t\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f43cdc\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#nation-state\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Nation-state threat actors\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Microsoft Digital Defense Report\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Microsoft Digital Defense Report\">\n\t\t\t\tNation-state threat actors\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n<div class=\"toc-item toc-item--level-0 wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f44417\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"#additional-reports\" class=\"toc-item__label\n\t\t\t\t\" data-bi-cn=\"Additional report topics\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Additional report topics\">\n\t\t\t\tAdditional report topics\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n\n<div class=\"toc-item toc-item--level-0 has-icon wp-block-microsoft-table-of-contents-toc-item\" data-wp-on--mouseenter=\"actions.activateItem\" data-wp-on--mouseleave=\"actions.deactivateItem\" data-wp-on--focusin=\"actions.activateItem\" data-wp-on--focusout=\"actions.deactivateItem\" data-wp-context='{\"itemId\":\"toc-item-69dac22f44517\"}' data-wp-class--is-active=\"state.isActive\">\n\t<div class=\"toc-item__header\">\n\t\t\t\t\t<a href=\"https:\/\/aka.ms\/mddrdownload\" class=\"toc-item__label\n\t\t\t\t\t\t\t\t\thas-icon\" target=\"_blank\" rel=\"noopener noreferrer\" data-bi-cn=\"Read the full report\" data-bi-ct=\"railmenu\" data-bi-an=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-ehn=\"Rail Menu\" data-bi-ecn=\"Read the full report\">\n\t\t\t\tRead the full report\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-3333c3a8 wp-block-group-is-layout-flex\"><ul class=\"wp-block-social-links has-small-icon-size has-icon-color has-icon-background-color is-layout-flex wp-container-core-social-links-is-layout-78e58421 wp-block-social-links-is-layout-flex\"><li style=\"color:#fff;background-color:#000;\" class=\"wp-social-link wp-social-link-linkedin has-white-color has-black-background-color wp-block-social-link\"><a data-bi-an=\"social media\" data-bi-ct=\"socialshare\" data-bi-ecn=\"Follow LinkedIn\" data-bi-ehn=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-socchn=\"LinkedIn\" rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-on-the-issues\" class=\"wp-block-social-link-anchor\" data-bi-cn=\"Follow LinkedIn\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n\n<li style=\"color:#fff;background-color:#000;\" class=\"wp-social-link wp-social-link-instagram has-white-color has-black-background-color wp-block-social-link\"><a data-bi-an=\"social media\" data-bi-ct=\"socialshare\" data-bi-ecn=\"Follow Instagram\" data-bi-ehn=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-socchn=\"Instagram\" rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.instagram.com\/msftissues\/\" class=\"wp-block-social-link-anchor\" data-bi-cn=\"Follow Instagram\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12,4.622c2.403,0,2.688,0.009,3.637,0.052c0.877,0.04,1.354,0.187,1.671,0.31c0.42,0.163,0.72,0.358,1.035,0.673 c0.315,0.315,0.51,0.615,0.673,1.035c0.123,0.317,0.27,0.794,0.31,1.671c0.043,0.949,0.052,1.234,0.052,3.637 s-0.009,2.688-0.052,3.637c-0.04,0.877-0.187,1.354-0.31,1.671c-0.163,0.42-0.358,0.72-0.673,1.035 c-0.315,0.315-0.615,0.51-1.035,0.673c-0.317,0.123-0.794,0.27-1.671,0.31c-0.949,0.043-1.233,0.052-3.637,0.052 s-2.688-0.009-3.637-0.052c-0.877-0.04-1.354-0.187-1.671-0.31c-0.42-0.163-0.72-0.358-1.035-0.673 c-0.315-0.315-0.51-0.615-0.673-1.035c-0.123-0.317-0.27-0.794-0.31-1.671C4.631,14.688,4.622,14.403,4.622,12 s0.009-2.688,0.052-3.637c0.04-0.877,0.187-1.354,0.31-1.671c0.163-0.42,0.358-0.72,0.673-1.035 c0.315-0.315,0.615-0.51,1.035-0.673c0.317-0.123,0.794-0.27,1.671-0.31C9.312,4.631,9.597,4.622,12,4.622 M12,3 C9.556,3,9.249,3.01,8.289,3.054C7.331,3.098,6.677,3.25,6.105,3.472C5.513,3.702,5.011,4.01,4.511,4.511 c-0.5,0.5-0.808,1.002-1.038,1.594C3.25,6.677,3.098,7.331,3.054,8.289C3.01,9.249,3,9.556,3,12c0,2.444,0.01,2.751,0.054,3.711 c0.044,0.958,0.196,1.612,0.418,2.185c0.23,0.592,0.538,1.094,1.038,1.594c0.5,0.5,1.002,0.808,1.594,1.038 c0.572,0.222,1.227,0.375,2.185,0.418C9.249,20.99,9.556,21,12,21s2.751-0.01,3.711-0.054c0.958-0.044,1.612-0.196,2.185-0.418 c0.592-0.23,1.094-0.538,1.594-1.038c0.5-0.5,0.808-1.002,1.038-1.594c0.222-0.572,0.375-1.227,0.418-2.185 C20.99,14.751,21,14.444,21,12s-0.01-2.751-0.054-3.711c-0.044-0.958-0.196-1.612-0.418-2.185c-0.23-0.592-0.538-1.094-1.038-1.594 c-0.5-0.5-1.002-0.808-1.594-1.038c-0.572-0.222-1.227-0.375-2.185-0.418C14.751,3.01,14.444,3,12,3L12,3z M12,7.378 c-2.552,0-4.622,2.069-4.622,4.622S9.448,16.622,12,16.622s4.622-2.069,4.622-4.622S14.552,7.378,12,7.378z M12,15 c-1.657,0-3-1.343-3-3s1.343-3,3-3s3,1.343,3,3S13.657,15,12,15z M16.804,6.116c-0.596,0-1.08,0.484-1.08,1.08 s0.484,1.08,1.08,1.08c0.596,0,1.08-0.484,1.08-1.08S17.401,6.116,16.804,6.116z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Instagram<\/span><\/a><\/li>\n\n\n<li style=\"color:#fff;background-color:#000;\" class=\"wp-social-link wp-social-link-x has-white-color has-black-background-color wp-block-social-link\"><a data-bi-an=\"social media\" data-bi-ct=\"socialshare\" data-bi-ecn=\"Follow X\" data-bi-ehn=\"Rail Menu\" data-bi-hn=\"Rail Menu\" data-bi-socchn=\"X\" rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/msftissues\" class=\"wp-block-social-link-anchor\" data-bi-cn=\"Follow X\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13.982 10.622 20.54 3h-1.554l-5.693 6.618L8.745 3H3.5l6.876 10.007L3.5 21h1.554l6.012-6.989L15.868 21h5.245l-7.131-10.378Zm-2.128 2.474-.697-.997-5.543-7.93H8l4.474 6.4.697.996 5.815 8.318h-2.387l-4.745-6.787Z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">X<\/span><\/a><\/li>\n<\/ul>\n\n\n<figure class=\"wp-block-image size-full is-resized\" style=\"margin-top:7px\"><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/\" target=\"_blank\" rel=\" noreferrer noopener\" data-bi-cn=\"Microsoft On The Issues Blog\"><img decoding=\"async\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/themes\/microsoft-cela\/dist\/images\/icon-edit.png\" alt=\"Microsoft On The Issues Blog\" class=\"wp-image-442\" style=\"object-fit:contain;width:23px;height:22px\"><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group wp-container-content-9cfa9a5a has-global-padding is-layout-constrained wp-container-core-group-is-layout-3156e74c wp-block-group-is-layout-constrained\"><div data-bi-ct=\"group\" class=\"wp-block-group has-body-sm-font-size microsoft-breakpoint-id-4h5qat6ao is-content-justification-right is-nowrap is-layout-flex wp-container-core-group-is-layout-b897b800 wp-block-group-is-layout-flex\" style=\"font-style:normal;font-weight:600;letter-spacing:0.15em;line-height:1;text-transform:uppercase\" data-microsoft-breakpoint-id=\"4h5qat6ao\"><p class=\"has-clear-orange-background-color has-background wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-right:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);padding-left:var(--wp--preset--spacing--xs)\">MDDR 2025 Report<\/p>\n\n\n<p class=\"has-light-orange-background-color has-background wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-right:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);padding-left:var(--wp--preset--spacing--xs)\">Nation-State<\/p>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-body-3-xl-fluid-font-size\">Nation-state threat actors<\/h2>\n\n\n<p class=\"wp-block-paragraph\">In 2025, nation-state threat actors evolved their cyber and influence operations with more advanced, targeted, and scalable tactics. They rapidly adopted AI to produce automatic and largescale influence campaigns.<\/p>\n\n\n<p class=\"wp-block-paragraph\">Nation-state actors remain focused on intelligence collection and public perception manipulation, shaping conflict narratives and flooding the information space with synthetic media to desensitize audiences and exhaust detection systems.<\/p>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group has-segoe-serif-font-family has-body-2-xl-fluid-font-size is-layout-flow wp-container-core-group-is-layout-dc4dbdce wp-block-group-is-layout-flow\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--xl-fluid);padding-top:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);line-height:1.1\"><p class=\"wp-block-paragraph\">Sectors most targeted by nation-state actors:<\/p>\n\n\n<p class=\"has-orange-color has-text-color has-link-color wp-elements-2b54d44fa4a18b71f8aaed99b38ff7b5 wp-block-paragraph\">IT, research and academia, government, think tanks, and non-governmental organizations.<\/p>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-2-xl-fluid-font-size\">Observed nation-state activity count per country<\/h3>\n\n\n<p class=\"wp-block-paragraph\">Certain countries face disproportionate levels of nation-state activity. This is a regional breakdown of countries that receive the most frequent adversary attacks.<\/p>\n\n\n<figure class=\"wp-block-image size-full block-visibility-hide-large-screen block-visibility-hide-medium-screen\"><img decoding=\"async\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/10\/GRAPH_4_MOBILE-scaled-e1760465690793.webp\" alt=\"Observed nation-state activity count per country\" class=\"wp-image-2356\"><figcaption class=\"wp-element-caption\">Source: Microsoft Threat Intelligence nation-state notification data<\/figcaption><\/figure>\n\n\n<figure class=\"wp-block-image size-full block-visibility-hide-small-screen\"><img decoding=\"async\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/10\/GRAPH_4_DESKTOP-scaled.webp\" alt=\"Observed nation-state activity count per country data\" class=\"wp-image-2358\"><figcaption class=\"wp-element-caption\">Source: Microsoft Threat Intelligence nation-state notification data<\/figcaption><\/figure>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group has-light-orange-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-7a813059 wp-block-group-is-layout-constrained\" style=\"padding-top:24px;padding-right:24px;padding-bottom:24px;padding-left:24px\"><div data-bi-ct=\"group\" class=\"wp-block-group callout-block microsoft-breakpoint-id-zjqzdmkcl is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-0703a39e wp-block-group-is-layout-flex\" style=\"border-bottom-color:var(--wp--preset--color--deep-blue);border-bottom-width:2px;padding-bottom:var(--wp--preset--spacing--xs)\" data-microsoft-breakpoint-id=\"zjqzdmkcl\"><div data-bi-ct=\"group\" class=\"wp-block-group callout__icon-container has-clear-orange-background-color has-background wp-container-content-8ca190d9 is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:6px;padding-right:6px;padding-bottom:6px;padding-left:6px\"><figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/themes\/microsoft-cela\/dist\/images\/icon-world.png\" alt=\"\" class=\"wp-image-346\" style=\"object-fit:contain;width:60px;height:60px\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-body-2-xl-fluid-font-size wp-container-content-92268ddc\">Signal red lines and impose diverse consequences for nation-state cyberattacks<\/h3>\n<\/div>\n\n\n<p class=\"has-body-font-size wp-block-paragraph\">States should make clear that malicious nation-state cyber activity will result in increasingly severe consequences. These responses can include a range of options, from economic measures and diplomatic sanctions to targeted declassification and public shaming.<\/p>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-segoe-sans-font-family has-body-2-xl-fluid-font-size\">Detecting North Korean foreign IT workers operating as nation-state actors<\/h3>\n\n\n<p class=\"wp-block-paragraph\" style=\"padding-top:0;padding-bottom:0\">North Korea places thousands of remote workers at unwitting companies every year to generate revenue and gain access to sensitive intellectual property. Workers are branching into new sectors and job types. Microsoft tracks this remote work activity and provides guidance on how to monitor and remediate this problem.<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs)\"><div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a data-bi-an=\"Nation-state threat actors\" data-bi-ct=\"link\" data-bi-ehn=\"Detecting North Korean foreign IT workers operating as nation-state actors\" data-bi-hn=\"Detecting North Korean foreign IT workers operating as nation-state actors\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=48\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Read case study\">Read case study<svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" style=\"width: 1em;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n<section data-bi-ct=\"group\" class=\"wp-block-group alignwide has-clear-blue-color has-text-color has-link-color wp-elements-2ff50ee6da91bdd9d2c8c54f42e2dfa6 is-layout-flow wp-block-group-is-layout-flow\" id=\"additional-reports\" style=\"padding-top:var(--wp--preset--spacing--2-xl-fluid);padding-bottom:var(--wp--preset--spacing--2-xl-fluid)\"><div data-bi-ct=\"group\" class=\"wp-block-group has-body-sm-font-size is-content-justification-right is-nowrap is-layout-flex wp-container-core-group-is-layout-b315634e wp-block-group-is-layout-flex\" style=\"font-style:normal;font-weight:600;letter-spacing:0.15em;line-height:1;text-transform:uppercase\"><p class=\"has-brown-black-color has-clear-blue-background-color has-text-color has-background has-link-color wp-elements-a4452d20a0eb96aee1b48d252ebea67b wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-right:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs);padding-left:var(--wp--preset--spacing--xs)\">MDDR 2025 Report<\/p>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-body-3-xl-fluid-font-size\">Additional report topics<\/h2>\n\n\n<p class=\"has-body-font-size wp-block-paragraph\" style=\"padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs)\">Take a deeper dive into the 2025 Microsoft Digital Defense Report.<br>Navigate to specific sections of the report below.<\/p>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-layout-grid wp-container-core-group-is-layout-200f939e wp-block-group-is-layout-grid\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm)\"><div data-bi-ct=\"group\" class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-a77db08e wp-block-group-is-layout-flow\"><h2 class=\"wp-block-heading\" style=\"border-top-color:var(--wp--preset--color--clear-blue);border-top-width:3px;padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs)\">Introduction<\/h2>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-container-core-buttons-is-layout-a53380d3 wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"Introductory statement by Amy Hogan-Burney and Igor Tsyganskiy\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=4\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Introductory statement by Amy Hogan-Burney and Igor Tsyganskiy\">Introductory statement by Amy Hogan-Burney and Igor Tsyganskiy<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025&amp;quot;\" data-bi-dltype=\"pdf\" data-bi-ecn=\"About this report\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=5\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"About this report\">About this report<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"Our unique vantage point\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=6\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Our unique vantage point\">Our unique vantage point<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"Top 10 recommendations from this report\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=7\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Top 10 recommendations from this report\">Top 10 recommendations from this report<\/a><\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-a77db08e wp-block-group-is-layout-flow\"><h2 class=\"wp-block-heading\" style=\"border-top-color:var(--wp--preset--color--clear-blue);border-top-width:3px;padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs)\">Part I. The threat landscape<\/h2>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-container-core-buttons-is-layout-a53380d3 wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"Key takeaways\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=9\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Key takeaways\">Key takeaways<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"How threat actors are shaping the cyber risk environment\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=10\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"How threat actors are shaping the cyber risk environment\">How threat actors are shaping the cyber risk environment<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"Identity, access, and the cybercrime economy\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=16\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Identity, access, and the cybercrime economy\">Identity, access, and the cybercrime economy<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"Human-operated attacks and ransomware\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=24\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Human-operated attacks and ransomware\">Human-operated attacks and ransomware<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"Fraud and social engineering\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=32\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Fraud and social engineering\">Fraud and social engineering<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"Social engineering exploits\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=36\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Social engineering exploits\">Social engineering exploits<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"dditional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"Cloud threat trends\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=41\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Cloud threat trends\">Cloud threat trends<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"Nation-state adversary threats\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=43\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Nation-state adversary threats\">Nation-state adversary threats<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"AI&amp;#039;s double-edge influence: Defending and disrupting the digital landscape\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=52\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"AI&amp;#039;s double-edge influence: Defending and disrupting the digital landscape\">AI&rsquo;s double-edge influence: Defending and disrupting the digital landscape<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"Quantum technologies: Strategic priority in a new era of competiton\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=57\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Quantum technologies: Strategic priority in a new era of competiton\">Quantum technologies: Strategic priority in a new era of competiton<\/a><\/div>\n<\/div>\n<\/div>\n\n\n<div data-bi-ct=\"group\" class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-a77db08e wp-block-group-is-layout-flow\"><h2 class=\"wp-block-heading\" style=\"border-top-color:var(--wp--preset--color--clear-blue);border-top-width:3px;padding-top:var(--wp--preset--spacing--xs);padding-bottom:var(--wp--preset--spacing--xs)\">Part II. The defense landscape<\/h2>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-container-core-buttons-is-layout-a53380d3 wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"Key takeaways: Insights and actions for cyber defense\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=59\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Key takeaways: Insights and actions for cyber defense\">Key takeaways: Insights and actions for cyber defense<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"AI and advanced defense\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=60\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"AI and advanced defense\">AI and advanced defense<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"Countering nation-state and emerging threats\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=64\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Countering nation-state and emerging threats\">Countering nation-state and emerging threats<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"Policy, capacity, and future readiness\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=70\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Policy, capacity, and future readiness\">Policy, capacity, and future readiness<\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-text\"><a data-bi-an=\"Additional report topics\" data-bi-ct=\"link\" data-bi-dlid=\"ms_digital_defense_report_2025_v1\" data-bi-dlnm=\"Microsoft Digital Defense Report 2025\" data-bi-dltype=\"pdf\" data-bi-ecn=\"Strategic vision and global commitments\" data-bi-ehn=\"Microsoft Digital Defense Report 2025\" data-bi-hn=\"Microsoft Digital Defense Report 2025\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/Microsoft-Digital-Defense-Report-2025#page=76\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Strategic vision and global commitments\">Strategic vision and global commitments<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n<section data-bi-ct=\"group\" class=\"wp-block-group alignfull has-white-color has-dark-blue-background-color has-text-color has-background has-link-color wp-elements-0e43b31658f38dca6c43e27b14bd3c9c has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" id=\"beyond\" style=\"padding-top:var(--wp--preset--spacing--2-xl-fluid);padding-bottom:var(--wp--preset--spacing--2-xl-fluid)\"><div data-bi-ct=\"group\" class=\"wp-block-group alignwide has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-9a551769 wp-block-group-is-layout-constrained\"><h2 class=\"wp-block-heading has-body-3-xl-fluid-font-size\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm)\">Beyond our report<\/h2>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-outline mobile-full-width is-style-outline--8\"><a data-bi-an=\"Beyond our report\" data-bi-ct=\"link\" data-bi-ehn=\"Beyond our report\" data-bi-hn=\"Beyond our report\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/aka.ms\/MDDR_ExecSummary\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Read the executive summary for CISOs\">Read the executive summary for CISOs <svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" style=\"width: 1em;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-outline is-style-outline--9\"><a data-bi-an=\"Beyond our report\" data-bi-ct=\"link\" data-bi-ehn=\"Beyond our report\" data-bi-hn=\"Beyond our report\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/\" data-bi-cn=\"Read more about cybersecurity\">Read more about cybersecurity<svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" style=\"width: 1em;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-outline is-style-outline--10\"><a data-bi-an=\"Beyond our report\" data-bi-ct=\"link\" data-bi-ehn=\"Beyond our report\" data-bi-hn=\"Beyond our report\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/customer-security-trust\" data-bi-cn=\"Learn about our cybersecurity programs\">Learn about our cybersecurity programs<svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" style=\"width: 1em;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-outline is-style-outline--11\"><a data-bi-an=\"Beyond our report\" data-bi-ct=\"link\" data-bi-ehn=\"Beyond our report\" data-bi-hn=\"Beyond our report\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/reports-hub\" data-bi-cn=\"Discover more Microsoft reports\">Discover more Microsoft reports<svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" style=\"width: 1em;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n\n\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-outline is-style-outline--12\"><a data-bi-an=\"Beyond our report\" data-bi-ct=\"link\" data-bi-ehn=\"Beyond our report\" data-bi-hn=\"Beyond our report\" class=\"wp-block-button__link wp-element-button has-inline-icon\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Cybersecurity for customers\">Cybersecurity for customers<svg class=\"ignite-wp-icon ignite-wp-icon--rendered\" style=\"width: 1em;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"5.337 5.336 13.326 13.326\"><path fill=\"currentColor\" d=\"M18.663 18.337h-2V8.75l-9.912 9.912-1.414-1.414 9.912-9.912H5.663v-2h13v13Z\"><\/path><\/svg><\/a><\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Digital Defense Report 2025This year&rsquo;s Microsoft Digital Defense Report (MDDR) showcases the scale and sophistication of today&rsquo;s cyber threats, the impact of emerging technologies on those threats, and the strategies that leaders, governments, and defenders can use to defend against them.ShareOur unique vantage pointMicrosoft&rsquo;s global presence&mdash;spanning billions of users, millions of organizations, and a [&hellip;]<\/p>\n","protected":false},"author":23,"featured_media":0,"parent":2463,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_microsoft_sidebar_content":"","_microsoft_bottom_content":"","_microsoft_story_hero_content":"","_microsoft_story_content_prefix_content":"","_microsoft_story_content_suffix_content":"","_microsoft_author-bio_content":"","_microsoft_responsive_featured_images":[],"_microsoft_use_source_image":false,"_microsoft_color_scheme":"default","footnotes":""},"class_list":["post-2421","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Digital Defense Report 2025 | Microsoft<\/title>\n<meta name=\"description\" content=\"This year&#039;s MDDR showcases the scale and sophistication of today&#039;s cyber threats, the impact of emerging technologies, and the strategies that leaders, governments, and defenders can use to defend against them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Digital Defense Report 2025 | Microsoft\" \/>\n<meta property=\"og:description\" content=\"This year&#039;s MDDR showcases the scale and sophistication of today&#039;s cyber threats, the impact of emerging technologies, and the strategies that leaders, governments, and defenders can use to defend against them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Corporate Responsibility\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-02T18:29:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/MDDR_SOCIAL_IMAGE-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"420\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"55 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\",\"name\":\"Microsoft Digital Defense Report 2025 | Microsoft\",\"isPartOf\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/10\/GRAPH_1_MOBILE-555x1024.webp\",\"datePublished\":\"2025-12-08T13:51:20+00:00\",\"dateModified\":\"2026-04-02T18:29:10+00:00\",\"description\":\"This year's MDDR showcases the scale and sophistication of today's cyber threats, the impact of emerging technologies, and the strategies that leaders, governments, and defenders can use to defend against them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/celacampaig.wpenginepowered.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"en-us\",\"item\":\"https:\/\/celacampaig.wpenginepowered.com\/en-us\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"corporate responsibility\",\"item\":\"https:\/\/celacampaig.wpenginepowered.com\/en-us\/corporate-responsibility\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/celacampaig.wpenginepowered.com\/en-us\/corporate-responsibility\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Microsoft Digital Defense Report 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#website\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/\",\"name\":\"Corporate Responsibility\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/celacampaig.wpenginepowered.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\",\"name\":\"Corporate Responsibility\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Corporate Responsibility\"},\"image\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Digital Defense Report 2025 | Microsoft","description":"This year's MDDR showcases the scale and sophistication of today's cyber threats, the impact of emerging technologies, and the strategies that leaders, governments, and defenders can use to defend against them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Digital Defense Report 2025 | Microsoft","og_description":"This year's MDDR showcases the scale and sophistication of today's cyber threats, the impact of emerging technologies, and the strategies that leaders, governments, and defenders can use to defend against them.","og_url":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/","og_site_name":"Microsoft Corporate Responsibility","article_modified_time":"2026-04-02T18:29:10+00:00","og_image":[{"width":800,"height":420,"url":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/MDDR_SOCIAL_IMAGE-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"55 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/celacampaig.wpenginepowered.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/","url":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/","name":"Microsoft Digital Defense Report 2025 | Microsoft","isPartOf":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/10\/GRAPH_1_MOBILE-555x1024.webp","datePublished":"2025-12-08T13:51:20+00:00","dateModified":"2026-04-02T18:29:10+00:00","description":"This year's MDDR showcases the scale and sophistication of today's cyber threats, the impact of emerging technologies, and the strategies that leaders, governments, and defenders can use to defend against them.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/celacampaig.wpenginepowered.com\/"},{"@type":"ListItem","position":2,"name":"en-us","item":"https:\/\/celacampaig.wpenginepowered.com\/en-us\/"},{"@type":"ListItem","position":3,"name":"corporate responsibility","item":"https:\/\/celacampaig.wpenginepowered.com\/en-us\/corporate-responsibility\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity","item":"https:\/\/celacampaig.wpenginepowered.com\/en-us\/corporate-responsibility\/cybersecurity\/"},{"@type":"ListItem","position":5,"name":"Microsoft Digital Defense Report 2025"}]},{"@type":"WebSite","@id":"https:\/\/celacampaig.wpenginepowered.com\/#website","url":"https:\/\/celacampaig.wpenginepowered.com\/","name":"Corporate Responsibility","description":"","publisher":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/celacampaig.wpenginepowered.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization","name":"Corporate Responsibility","url":"https:\/\/celacampaig.wpenginepowered.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Corporate Responsibility"},"image":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/pages\/2421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/comments?post=2421"}],"version-history":[{"count":0,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/pages\/2421\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/pages\/2463"}],"wp:attachment":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/media?parent=2421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}