{"id":2453,"date":"2025-10-09T10:00:00","date_gmt":"2025-10-09T17:00:00","guid":{"rendered":"https:\/\/celacampaindev.wpenginepowered.com\/?p=2453"},"modified":"2026-01-28T15:07:33","modified_gmt":"2026-01-28T23:07:33","slug":"what-is-caas","status":"publish","type":"post","link":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/what-is-caas\/","title":{"rendered":"Cybercrime-as-a-Service, Explained"},"content":{"rendered":"<p class=\"wp-block-paragraph\">The Hollywood image of a cybercriminal is a lone wolf in the shadows; a renegade thief or saboteur. But cybercrime today looks very different. The lone wolves have formed organized groups and are working together, learning from one another, and growing more sophisticated. As the cybercriminal ecosystem has matured, it has pivoted toward economies of scale, specialization of labor, and the trappings of modern professional life&mdash;less criminals in dark basements hunched over laptops and more payroll squabbles, program management software, and IT help desks.<\/p><p class=\"wp-block-paragraph\">The cybercrime landscape now looks increasingly like a shadow version of the tech industry, with similar tools, practices, and technological innovations. Just as Software-as-a-Service (SaaS) has transformed legitimate enterprises, a parallel trend has emerged in the criminal world: Cybercrime-as-a-Service (CaaS). Taking advantage of the same dynamics that make SaaS successful&mdash;modular services, pay-per-use economics, and ease of use for non-experts&mdash;CaaS makes cybercrime more accessible, scalable, and efficient.<\/p><p class=\"wp-block-paragraph\">The 2025 Microsoft Digital Defense Report (MDDR) will share the latest on how threat actors are using CaaS to outsource the technical aspects of cybercrime and ramp up their impact. Here&rsquo;s what you need to know.<\/p><h2 class=\"wp-block-heading\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg);line-height:1.3\">How does CaaS work?<\/h2><p class=\"wp-block-paragraph\">CaaS is a business model for cybercrime in which specialized vendors sell packaged tools and services. They transact on encrypted messaging platforms and dark web marketplaces, with prices typically set in cryptocurrency. Tack &ldquo;as a service&rdquo; onto any common cyberthreat and you&rsquo;ll probably find it in the CaaS economy: phishing, ransomware, malware, Distributed Denial-of-Service (DDoS), botnets, and more.<\/p><p class=\"wp-block-paragraph\">The growth of CaaS means that threat actors no longer need technical expertise to launch sophisticated attacks; they can simply purchase the tools and access from someone else. These purchases can range from a one-off, like a DDoS attack, to an ongoing subscription for botnets or malware. It&rsquo;s analogous to an entrepreneur using a SaaS platform to set up an online marketplace in a day or two without writing a single line of code.<\/p><p class=\"wp-block-paragraph\">In just a few years, CaaS has gone from an emerging phenomenon to a robust economy that spans the globe. The barrier to entry for cybercrime has never been lower, which means more people have both the incentive and opportunity to get involved. That might be students with specialized tech skills looking to make extra money, or traditional organized crime groups expanding their scope&mdash;Europol has reported that criminal networks are&nbsp;<a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/dna-of-organised-crime-changing-and-so-threat-to-europe\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"increasingly operating in the digital realm.\">increasingly operating in the digital realm.<\/a><\/p><h2 class=\"wp-block-heading\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg);line-height:1.3\">How did CaaS come about?<\/h2><p class=\"wp-block-paragraph\">It&rsquo;s difficult to pinpoint exactly when CaaS emerged, but the concept has its roots in &ldquo;kits&rdquo; for phishing and exploit campaigns, which enable non-experts to purchase the technical components and deploy an attack themselves. As underground vendors recognized the economic potential of packaging tools and capabilities for sale, they took the idea further and began offering end-to-end services.<\/p><p class=\"wp-block-paragraph\">Phishing-as-a-Service, for example, packages phish kits with email templates, landing page hosting services, and tools to capture victims&rsquo; credentials. For as low as $50 per month, an actor can rent a kit and set their operations on autopilot, reaping the rewards with almost no effort&nbsp;<sup><a href=\"#fn:1\" data-bi-cn=\"1\">1<\/a><\/sup>&nbsp;In the&#8239;Ransomware-as-a-Service (RaaS) model, which has now become the norm for ransomware, vendors develop ransomware and work with &ldquo;affiliates&rdquo; who hack a network and deploy the ransomware. The ransomware group then negotiates with victims on the affiliate&rsquo;s behalf, and profits are shared between the group and the affiliate in a transparent, publicly advertised royalty split.<\/p><h2 class=\"wp-block-heading\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg);line-height:1.3\">CaaS today<\/h2><p class=\"wp-block-paragraph\">With ongoing development of the cybercrime economy, the end-to-end CaaS model for specialized attacks such as phishing or ransomware has given way to a decentralized ecosystem of providers, each playing a specialized role in an attack:<\/p><p class=\"wp-block-paragraph\"><strong>Developers&nbsp;<\/strong>create the technical components, whether&nbsp;that&rsquo;s&nbsp;phish kits, malware&nbsp;such as infostealers,&nbsp;or&nbsp;ransomware.&nbsp;<\/p><p class=\"wp-block-paragraph\"><strong>Access brokers<\/strong>&nbsp;breach computer systems, networks, and accounts,&nbsp;then monetize access&mdash;they sell the keys to the treasure chest, not the treasure itself. Access brokers sell everything from VPN logins and remote access credentials to company directories and admin privileges.&#8239;<\/p><p class=\"wp-block-paragraph\"><strong>Operators<\/strong>&nbsp;use technical tools created by developers and access&nbsp;that&rsquo;s&nbsp;bought or leased from brokers to&nbsp;deploy attacks. Operators are end users&nbsp;and could include&nbsp;ransomware affiliates, data extortion groups, cyber mercenaries, or nation-state actors.&nbsp;<\/p><p class=\"wp-block-paragraph\">This division of labor can be found in various types of attacks, thereby increasing efficiency and effectiveness and lowering prices. As CaaS has professionalized, vendors have adopted the structures of legitimate tech companies with branded services, marketing, tiered pricing, and even tech support.<\/p><h2 class=\"wp-block-heading\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg);line-height:1.3\">What&rsquo;s next?<\/h2><p class=\"wp-block-paragraph\">Just as AI is empowering modern businesses to be more efficient, it is doing the same for the CaaS economy. AI is already beginning to streamline processes across the CaaS ecosystem, making cybercrime faster, easier, cheaper, and more effective. Operators can use AI to write effective phishing emails free of telltale grammar and spelling errors, and automate targeted spear phishing attacks. Ransomware groups are using AI translation tools for real-time negotiations. Access brokers can use AI to scan systems for vulnerabilities, finding chinks in the armor they can exploit, and then escalate privileges of stolen user accounts without human intervention.<\/p><h2 class=\"wp-block-heading\" style=\"margin-top:var(--wp--preset--spacing--xl-fluid);margin-bottom:var(--wp--preset--spacing--lg)\"><strong>Learn more<\/strong><\/h2><p class=\"wp-block-paragraph\">Microsoft&rsquo;s threat analysts and digital crimes specialists track cybercrimes worldwide to understand the evolution and how to stay ahead of emerging threats. The 2025 Microsoft Digital Defense Report (MDDR) will break down recent developments and what organizations and individuals can do to protect themselves. Come back when the report is available for download on October 16, 2025.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrime-as-a-Service (CaaS) is a business model that enables threat actors to deploy cyberattacks with little or no technical expertise. Learn more about this increasingly robust underground economy.<\/p>\n","protected":false},"author":23,"featured_media":2454,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_microsoft_sidebar_content":"<!-- wp:group {\"metadata\":{\"name\":\"Social Share\"},\"style\":{\"spacing\":{\"blockGap\":\"var:preset|spacing|sm\"}},\"layout\":{\"type\":\"flex\",\"flexWrap\":\"nowrap\",\"justifyContent\":\"left\"},\"microsoftBreakpointId\":\"05xlfuiuy\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-05xlfuiuy\" data-microsoft-breakpoint-id=\"05xlfuiuy\"><!-- wp:paragraph {\"style\":{\"typography\":{\"fontStyle\":\"normal\",\"fontWeight\":\"600\",\"textTransform\":\"uppercase\",\"letterSpacing\":\"6px\"}},\"fontSize\":\"body-sm\"} -->\n<p class=\"has-body-sm-font-size\" style=\"font-style:normal;font-weight:600;letter-spacing:6px;text-transform:uppercase\">Share<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:microsoft-social-share\/social-share {\"show_facebook\":false,\"order_share\":2,\"order_facebook\":3,\"order_x\":1,\"order_linkedin\":0,\"backgroundColor\":\"#291817\",\"globalUrlOverride\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/\",\"xUrlOverride\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/\"} \/--><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"className\":\"temp-color-scheme-post-card temp-left-card\",\"style\":{\"spacing\":{\"padding\":{\"top\":\"var:preset|spacing|sm\",\"bottom\":\"var:preset|spacing|sm\",\"left\":\"var:preset|spacing|sm\",\"right\":\"var:preset|spacing|sm\"}}},\"layout\":{\"type\":\"default\"},\"blockVisibility\":{\"controlSets\":[{\"id\":1,\"enable\":true,\"controls\":{\"screenSize\":{\"hideOnScreenSize\":{\"small\":true}}}}]},\"hoverTextColor\":\"#c6e3f3\",\"hoverLinkColor\":\"#c6e3f3\",\"microsoftBreakpointId\":\"8vxt56kk0\"} -->\n<div class=\"wp-block-group temp-color-scheme-post-card temp-left-card has-hover-text has-hover-link microsoft-breakpoint-id-8vxt56kk0\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm);--hover-text-color:#c6e3f3;--hover-link-color:#c6e3f3\" data-microsoft-breakpoint-id=\"8vxt56kk0\"><!-- wp:heading {\"style\":{\"typography\":{\"lineHeight\":\"1.2\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h2 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.2\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\" target=\"_blank\" rel=\"noreferrer noopener\">5 things you need to know about tracking today's nation-state threats<\/a><\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-custom-font-size wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/5-things-threat-analyst\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read the article<img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" style=\"width: 1em;)\" class=\"ignite-wp-icon\"><\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"className\":\"temp-color-scheme-post-card temp-left-card\",\"style\":{\"spacing\":{\"padding\":{\"top\":\"var:preset|spacing|sm\",\"bottom\":\"var:preset|spacing|sm\",\"left\":\"var:preset|spacing|sm\",\"right\":\"var:preset|spacing|sm\"}}},\"layout\":{\"type\":\"default\"},\"blockVisibility\":{\"controlSets\":[{\"id\":1,\"enable\":true,\"controls\":{\"screenSize\":{\"hideOnScreenSize\":{\"small\":true}}}}]},\"hoverTextColor\":\"#c6e3f3\",\"hoverLinkColor\":\"#c6e3f3\",\"microsoftBreakpointId\":\"q5jl9d9gu\"} -->\n<div class=\"wp-block-group temp-color-scheme-post-card temp-left-card has-hover-text has-hover-link microsoft-breakpoint-id-q5jl9d9gu\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm);--hover-text-color:#c6e3f3;--hover-link-color:#c6e3f3\" data-microsoft-breakpoint-id=\"q5jl9d9gu\"><!-- wp:heading {\"style\":{\"typography\":{\"lineHeight\":\"1.2\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h2 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.2\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/DCU-law-fighting-cybercrime\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft\u2019s Digital Crimes Unit helps the law move at the speed of cybercrime<\/a><\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-custom-font-size wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/DCU-law-fighting-cybercrime\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read the article <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" style=\"width: 1em;)\" class=\"ignite-wp-icon\"><\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:quote {\"className\":\"is-style-framed\",\"blockVisibility\":{\"controlSets\":[{\"id\":1,\"enable\":true,\"controls\":{\"screenSize\":{\"hideOnScreenSize\":{\"small\":true}}}}]}} -->\n<blockquote class=\"wp-block-quote is-style-framed\"><!-- wp:paragraph -->\n<p>The cybercrime landscape now looks increasingly like a shadow version of the tech industry with similar tools, practices, and technological innovations.<\/p>\n<!-- \/wp:paragraph --><\/blockquote>\n<!-- \/wp:quote -->","_microsoft_bottom_content":"<!-- wp:group {\"align\":\"wide\",\"style\":{\"spacing\":{\"blockGap\":\"var:preset|spacing|xl-fluid\"}},\"layout\":{\"type\":\"grid\",\"minimumColumnWidth\":\"19rem\"},\"microsoftBreakpointId\":\"vg97ktoc2\"} -->\n<div class=\"wp-block-group alignwide microsoft-breakpoint-id-vg97ktoc2\" data-microsoft-breakpoint-id=\"vg97ktoc2\"><!-- wp:group {\"isClickable\":true,\"className\":\"temp-card\",\"layout\":{\"type\":\"flex\",\"orientation\":\"vertical\",\"justifyContent\":\"stretch\",\"verticalAlignment\":\"space-between\"},\"clickableNewTab\":true,\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"microsoftBreakpointId\":\"akqp5hbu1\"} -->\n<div class=\"wp-block-group temp-card microsoft-breakpoint-id-akqp5hbu1\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-new-tab=\"true\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" role=\"link\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"akqp5hbu1\"><!-- wp:group {\"layout\":{\"type\":\"default\"}} -->\n<div class=\"wp-block-group\"><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":2455,\"aspectRatio\":\"16\/9\",\"scale\":\"cover\",\"sizeSlug\":\"full\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2024\/11\/21\/targeting-the-cybercrime-supply-chain\/\" target=\"_blank\" rel=\" noreferrer noopener\"><img src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/DCU-Disruption-Operation-Pin-Blog-Header_1280p.jpg\" alt=\"Blog post: Targeting the cybercrime supply chain\" class=\"wp-image-2455\" style=\"aspect-ratio:16\/9;object-fit:cover\" \/><\/a><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3,\"style\":{\"typography\":{\"lineHeight\":\"1.3\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h3 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.3\"><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2024\/11\/21\/targeting-the-cybercrime-supply-chain\/\" target=\"_blank\" rel=\"noreferrer noopener\">Targeting the cybercrime supply chain<\/a><\/h3>\n<!-- \/wp:heading --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:buttons {\"layout\":{\"type\":\"flex\",\"justifyContent\":\"left\"}} -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"textAlign\":\"right\",\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2024\/11\/21\/targeting-the-cybercrime-supply-chain\/\" target=\"_blank\" rel=\"noreferrer noopener\">\n    <span class=\"screen-reader-text\">\n      Read \u201c5 things threat analysts wish you knew\u201d\n    <\/span>\n    <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" class=\"ignite-wp-icon\" style=\"width: 1em;)\" alt=\"\" aria-hidden=\"true\">\n  <\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"isClickable\":true,\"className\":\"temp-card\",\"layout\":{\"type\":\"flex\",\"orientation\":\"vertical\",\"justifyContent\":\"stretch\",\"verticalAlignment\":\"space-between\"},\"clickableNewTab\":true,\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"microsoftBreakpointId\":\"kqwgamj1w\"} -->\n<div class=\"wp-block-group temp-card microsoft-breakpoint-id-kqwgamj1w\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-new-tab=\"true\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" role=\"link\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"kqwgamj1w\"><!-- wp:group {\"layout\":{\"type\":\"default\"}} -->\n<div class=\"wp-block-group\"><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":2456,\"aspectRatio\":\"16\/9\",\"scale\":\"cover\",\"sizeSlug\":\"full\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/05\/21\/microsoft-leads-global-action-against-favored-cybercrime-tool\/\" target=\"_blank\" rel=\" noreferrer noopener\"><img src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/FY25_Q4_PA_Cybersecurity__Blog-Header-1web.webp\" alt=\"Blog post: Microsoft leads global action against favored cybercrime tool\" class=\"wp-image-2456\" style=\"aspect-ratio:16\/9;object-fit:cover\" \/><\/a><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3,\"style\":{\"typography\":{\"lineHeight\":\"1.3\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h3 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.3\"><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/05\/21\/microsoft-leads-global-action-against-favored-cybercrime-tool\/\" target=\"_blank\" rel=\"noreferrer noopener\">Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool<\/a><\/h3>\n<!-- \/wp:heading --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:buttons {\"layout\":{\"type\":\"flex\",\"justifyContent\":\"left\"}} -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"textAlign\":\"right\",\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/05\/21\/microsoft-leads-global-action-against-favored-cybercrime-tool\/\" target=\"_blank\" rel=\"noreferrer noopener\">\n    \n    <span class=\"screen-reader-text\">\n      Read \u201cProtecting NGOs from cyberattacks\u201d\n    <\/span>\n\n    <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" class=\"ignite-wp-icon\" style=\"width: 1em;)\" alt=\"\" aria-hidden=\"true\">\n  <\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"isClickable\":true,\"className\":\"temp-card\",\"layout\":{\"type\":\"flex\",\"orientation\":\"vertical\",\"justifyContent\":\"stretch\",\"verticalAlignment\":\"space-between\"},\"clickableNewTab\":true,\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"microsoftBreakpointId\":\"fv3ky7uqe\"} -->\n<div class=\"wp-block-group temp-card microsoft-breakpoint-id-fv3ky7uqe\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-new-tab=\"true\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" role=\"link\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"fv3ky7uqe\"><!-- wp:group {\"layout\":{\"type\":\"default\"}} -->\n<div class=\"wp-block-group\"><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":2342,\"aspectRatio\":\"16\/9\",\"scale\":\"cover\",\"sizeSlug\":\"large\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cpi-protecting-ngos\/\"><img src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/11\/HEADER_DCU-1024x436.webp\" alt=\"Story: CyberPeace Institute protecting NGOs\" class=\"wp-image-2342\" style=\"aspect-ratio:16\/9;object-fit:cover\" \/><\/a><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3,\"style\":{\"typography\":{\"lineHeight\":\"1.3\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h3 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.3\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cpi-protecting-ngos\/\" target=\"_blank\" rel=\"noreferrer noopener\">The CyberPeace Institute is helping NGOs defend themselves\u2014before it\u2019s too late<\/a><\/h3>\n<!-- \/wp:heading --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"textAlign\":\"right\",\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cpi-protecting-ngos\/\">\n\n    <span class=\"screen-reader-text\">\n      Read \u201cStarting your journey to become quantum-safe\u201d\n    <\/span>\n\n    <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" class=\"ignite-wp-icon\" style=\"width: 1em;)\" alt=\"\" aria-hidden=\"true\">\n  <\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group --><\/div>\n<!-- \/wp:group -->","_microsoft_story_hero_content":"<!-- wp:group {\"align\":\"wide\",\"style\":{\"spacing\":{\"blockGap\":\"0\"},\"typography\":{\"fontStyle\":\"normal\",\"fontWeight\":\"600\",\"textTransform\":\"uppercase\",\"letterSpacing\":\"0.15em\",\"lineHeight\":\"1\"}},\"fontSize\":\"body-xs\",\"layout\":{\"type\":\"flex\",\"flexWrap\":\"nowrap\",\"justifyContent\":\"left\"},\"microsoftBreakpointId\":\"zmxsh4o4w\"} -->\n<div class=\"wp-block-group alignwide has-body-xs-font-size microsoft-breakpoint-id-zmxsh4o4w\" style=\"font-style:normal;font-weight:600;letter-spacing:0.15em;line-height:1;text-transform:uppercase\" data-microsoft-breakpoint-id=\"zmxsh4o4w\"><!-- wp:tenup\/post-primary-term {\"isLink\":false,\"style\":{\"spacing\":{\"padding\":{\"top\":\"var:preset|spacing|xs\",\"bottom\":\"var:preset|spacing|xs\",\"left\":\"var:preset|spacing|xs\",\"right\":\"var:preset|spacing|xs\"}},\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|clear-blue\"}}}},\"backgroundColor\":\"brown-black\",\"textColor\":\"clear-blue\"} \/--><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"align\":\"wide\",\"className\":\"is-style-post-header\",\"layout\":{\"type\":\"flex\",\"flexWrap\":\"wrap\",\"justifyContent\":\"space-between\",\"verticalAlignment\":\"bottom\"},\"microsoftBreakpointId\":\"3xxgrttak\"} -->\n<div class=\"wp-block-group alignwide is-style-post-header microsoft-breakpoint-id-3xxgrttak\" data-microsoft-breakpoint-id=\"3xxgrttak\"><!-- wp:group {\"style\":{\"layout\":{\"selfStretch\":\"fixed\",\"flexSize\":\"\"}},\"layout\":{\"type\":\"default\"},\"microsoftBreakpointId\":\"kgbedb7qx\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-kgbedb7qx\" data-microsoft-breakpoint-id=\"kgbedb7qx\"><!-- wp:post-title {\"level\":1,\"style\":{\"typography\":{\"lineHeight\":\"1.2\"}},\"fontSize\":\"body-4-xl-fluid\"} \/--><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:post-excerpt {\"style\":{\"layout\":{\"selfStretch\":\"fit\",\"flexSize\":\"\"}}} \/--><\/div>\n<!-- \/wp:group -->","_microsoft_story_content_prefix_content":"<!-- wp:group {\"layout\":{\"type\":\"flex\",\"flexWrap\":\"nowrap\",\"justifyContent\":\"right\",\"orientation\":\"horizontal\",\"verticalAlignment\":\"bottom\"},\"microsoftBreakpointId\":\"78xaub60h\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-78xaub60h\" data-microsoft-breakpoint-id=\"78xaub60h\"><!-- wp:post-date {\"format\":\"M j, Y\"} \/--><\/div>\n<!-- \/wp:group -->","_microsoft_story_content_suffix_content":"<!-- wp:paragraph {\"placeholder\":\"Add content to this area...\"} -->\n<p><sup>1<\/sup><a href=\"https:\/\/www.thesslstore.com\/blog\/phishing-as-a-service-turn-key-phishing-kits\/\" target=\"_blank\" rel=\"noreferrer noopener\">Phishing-as-a-Service: Turn-key Phishing Kits \u2013 Hashed Out by The SSL Store\u2122<\/a><\/p>\n<!-- \/wp:paragraph -->","_microsoft_author-bio_content":"","_microsoft_responsive_featured_images":[],"_microsoft_use_source_image":false,"_microsoft_color_scheme":"clear-blue","footnotes":""},"categories":[13,6],"tags":[],"topic":[48],"class_list":["post-2453","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-industry","topic-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercrime-as-a-Service, Explained | Microsoft<\/title>\n<meta name=\"description\" content=\"Understanding how Cybercrime-as-a-Service is transforming the threat landscape and making attacks more accessible.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime-as-a-Service, Explained | Microsoft\" \/>\n<meta property=\"og:description\" content=\"Understanding how Cybercrime-as-a-Service is transforming the threat landscape and making attacks more accessible.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Corporate Responsibility\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-09T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-28T23:07:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CaaSexplainer_heroart_shadowtechindustry-e1765307399142.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CELA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CELA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/what-is-caas\/\"},\"author\":{\"name\":\"CELA\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0\"},\"headline\":\"Cybercrime-as-a-Service, Explained\",\"datePublished\":\"2025-10-09T17:00:00+00:00\",\"dateModified\":\"2026-01-28T23:07:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/what-is-caas\/\"},\"wordCount\":923,\"publisher\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CaaSexplainer_heroart_shadowtechindustry-e1765307399142.jpg\",\"articleSection\":[\"Cybersecurity\",\"Industry\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/what-is-caas\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/\",\"name\":\"Cybercrime-as-a-Service, Explained | Microsoft\",\"isPartOf\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CaaSexplainer_heroart_shadowtechindustry-e1765307399142.jpg\",\"datePublished\":\"2025-10-09T17:00:00+00:00\",\"dateModified\":\"2026-01-28T23:07:33+00:00\",\"description\":\"Understanding how Cybercrime-as-a-Service is transforming the threat landscape and making attacks more accessible.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/#primaryimage\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CaaSexplainer_heroart_shadowtechindustry-e1765307399142.jpg\",\"contentUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CaaSexplainer_heroart_shadowtechindustry-e1765307399142.jpg\",\"width\":800,\"height\":400,\"caption\":\"An illustration of pedestrians walking near a business office.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/celacampaig.wpenginepowered.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime-as-a-Service, Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#website\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/\",\"name\":\"Corporate Responsibility\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/celacampaig.wpenginepowered.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\",\"name\":\"Corporate Responsibility\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Corporate Responsibility\"},\"image\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0\",\"name\":\"CELA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g\",\"caption\":\"CELA\"},\"sameAs\":[\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrime-as-a-Service, Explained | Microsoft","description":"Understanding how Cybercrime-as-a-Service is transforming the threat landscape and making attacks more accessible.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/","og_locale":"en_US","og_type":"article","og_title":"Cybercrime-as-a-Service, Explained | Microsoft","og_description":"Understanding how Cybercrime-as-a-Service is transforming the threat landscape and making attacks more accessible.","og_url":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/","og_site_name":"Microsoft Corporate Responsibility","article_published_time":"2025-10-09T17:00:00+00:00","article_modified_time":"2026-01-28T23:07:33+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CaaSexplainer_heroart_shadowtechindustry-e1765307399142.jpg","type":"image\/jpeg"}],"author":"CELA","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CELA","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/#article","isPartOf":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/what-is-caas\/"},"author":{"name":"CELA","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0"},"headline":"Cybercrime-as-a-Service, Explained","datePublished":"2025-10-09T17:00:00+00:00","dateModified":"2026-01-28T23:07:33+00:00","mainEntityOfPage":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/what-is-caas\/"},"wordCount":923,"publisher":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/#primaryimage"},"thumbnailUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CaaSexplainer_heroart_shadowtechindustry-e1765307399142.jpg","articleSection":["Cybersecurity","Industry"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/what-is-caas\/","url":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/","name":"Cybercrime-as-a-Service, Explained | Microsoft","isPartOf":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/#primaryimage"},"thumbnailUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CaaSexplainer_heroart_shadowtechindustry-e1765307399142.jpg","datePublished":"2025-10-09T17:00:00+00:00","dateModified":"2026-01-28T23:07:33+00:00","description":"Understanding how Cybercrime-as-a-Service is transforming the threat landscape and making attacks more accessible.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/#primaryimage","url":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CaaSexplainer_heroart_shadowtechindustry-e1765307399142.jpg","contentUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/CaaSexplainer_heroart_shadowtechindustry-e1765307399142.jpg","width":800,"height":400,"caption":"An illustration of pedestrians walking near a business office."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/what-is-caas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/celacampaig.wpenginepowered.com\/"},{"@type":"ListItem","position":2,"name":"Cybercrime-as-a-Service, Explained"}]},{"@type":"WebSite","@id":"https:\/\/celacampaig.wpenginepowered.com\/#website","url":"https:\/\/celacampaig.wpenginepowered.com\/","name":"Corporate Responsibility","description":"","publisher":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/celacampaig.wpenginepowered.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization","name":"Corporate Responsibility","url":"https:\/\/celacampaig.wpenginepowered.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Corporate Responsibility"},"image":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0","name":"CELA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g","caption":"CELA"},"sameAs":["https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/"]}]}},"_links":{"self":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/posts\/2453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/comments?post=2453"}],"version-history":[{"count":0,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/posts\/2453\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/media\/2454"}],"wp:attachment":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/media?parent=2453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/categories?post=2453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/tags?post=2453"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/topic?post=2453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}