{"id":105993,"date":"2022-02-03T06:00:00","date_gmt":"2022-02-03T14:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=105993"},"modified":"2025-06-20T06:42:21","modified_gmt":"2025-06-20T13:42:21","slug":"cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/","title":{"rendered":"Cyber Signals: Defending against cyber threats with the latest research, insights, and trends"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">We\u2019re excited to&nbsp;introduce <a href=\"https:\/\/aka.ms\/cyber-signals\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Signals<\/a>,&nbsp;a cyber threat intelligence brief&nbsp;informed by the latest&nbsp;Microsoft&nbsp;threat data and&nbsp;research. This&nbsp;content, which will be released&nbsp;quarterly, offers&nbsp;an expert perspective into&nbsp;the current threat landscape,&nbsp;discussing&nbsp;trending tactics, techniques, and strategies used by the world\u2019s most prolific threat actors.&nbsp;As such, we hope it\u2019s a valuable resource to Chief Information Security Officers, Chief Information Officers, Chief Privacy Officers, and their teams, as they continue to evolve&nbsp;technologies, policies, and processes against the constantly changing threat landscape. At Microsoft, we believe that security is a team sport and that when we share what we\u2019re learning, we can all make the world a safer place.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Cyber Signals aggregates insights&nbsp;we&nbsp;see&nbsp;from&nbsp;our research and&nbsp;security teams on the frontlines. This includes analysis from our 24 trillion security signals combined with intelligence we track by monitoring more than 40 nation-state groups and over 140 threat groups.&nbsp;In our first&nbsp;edition,&nbsp;we unpack&nbsp;the topic of&nbsp;identity.&nbsp;Our identities are made up of everything we say and do in our lives, recorded as data that spans across a sea of apps and services. While this delivers great utility, if we don\u2019t maintain good security hygiene our identities are at risk. And over the last year, we have seen identity become the battleground for security.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">While threats have been rising fast over the past two years, there has been low adoption&nbsp;of strong identity authentication, such as <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/04\/05\/protect-your-business-from-email-phishing-with-multi-factor-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">multifactor authentication<\/a> (MFA) and&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/15\/the-passwordless-future-is-here-for-your-microsoft-account\/\" target=\"_blank\" rel=\"noreferrer noopener\">passwordless&nbsp;solutions<\/a>.&nbsp;For example, our research shows that&nbsp;across industries,&nbsp;only&nbsp;22&nbsp;percent&nbsp;of customers using Microsoft Azure Active Directory (Azure AD), Microsoft&#8217;s Cloud Identity Solution, have&nbsp;implemented strong identity authentication protection&nbsp;as of December 2021.&nbsp;MFA and passwordless solutions can go a long way in preventing a variety of threats and we&#8217;re committed to educating customers on solutions such as these to better protect themselves. From January&nbsp;2021&nbsp;through December 2021, we\u2019ve blocked&nbsp;more than&nbsp;25.6&nbsp;billion&nbsp;Azure AD brute force authentication&nbsp;attacks and intercepted&nbsp;35.7 billion phishing&nbsp;emails&nbsp;with Microsoft Defender for Office 365.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">With 8,500 security defenders protecting the platforms, tools, services, and endpoints that support our online lives, we\u2019re dedicated to thwarting advanced cyberattacks. At Microsoft, we understand our role in helping to protect and defend our most valuable digital asset, our identity. To ensure people are who they say they are when they access Microsoft accounts and services, we verify their identity<em>\u2014<\/em>but relying on a single password to authenticate users creates an attractive point of failure for hackers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Online&nbsp;threats&nbsp;are increasing in volume, velocity,&nbsp;and sophistication.&nbsp;From IoT to nation-state activity, new ransomware tactics to insights into the&nbsp;cybercriminal economy, Cyber Signals provides trend analysis and practical guidance&nbsp;to strengthen the first line of digital defense.&nbsp;With increasing numbers of people working remotely and accessing their business apps and data from multiple locations, including home offices, coworking spaces, and other remote locations, individuals are realizing the importance of secure authentication. And it\u2019s not just about securing enterprises, it\u2019s our personal data, devices, identities, platforms, and clouds that are also targets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">With <a href=\"https:\/\/aka.ms\/cyber-signals\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Signals<\/a>, we\u2019ll share trends, tactics, and strategies threat actors use to gain access to the&nbsp;hardware&nbsp;and software that houses one\u2019s most sensitive data. We will also help inform the world on how, collectively, we can protect our most precious digital resources and our digital lives so we can build a safer world together.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">visit our website<\/a>. Bookmark the\u202f<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>\u202fto keep up with our expert coverage on security matters. Also, follow us at\u202f<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>\u202ffor the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019re excited to introduce Cyber Signals, a cyber threat intelligence brief informed by the latest Microsoft threat data and research. This content, which will be released quarterly, offers an expert perspective into the current threat landscape, discussing trending tactics, techniques, and strategies used by the world\u2019s most prolific threat actors.<\/p>\n","protected":false},"author":106,"featured_media":106017,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3809],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[3690,3695,3702,3703],"topic":[3678,3688],"coauthors":[2400],"class_list":["post-105993","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-security-strategies","content-type-news","product-microsoft-defender","product-microsoft-defender-for-office-365","product-microsoft-entra","product-microsoft-entra-id","topic-multifactor-authentication","topic-threat-trends","review-flag-6-1694638266-691","review-flag-7-1694638266-851","review-flag-8-1694638266-352","review-flag-iot-1694638272-473","review-flag-new-1694638263-340","review-flag-percent"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Signals: Defending against cyber threats with the latest research, insights, and trends | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Signals: Defending against cyber threats with the latest research, insights, and trends | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"We\u2019re excited to introduce Cyber Signals, a cyber threat intelligence brief informed by the latest Microsoft threat data and research. This content, which will be released quarterly, offers an expert perspective into the current threat landscape, discussing trending tactics, techniques, and strategies used by the world\u2019s most prolific threat actors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-03T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-20T13:42:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/02\/CLO22_Warehouse_018.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"799\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vasu Jakkal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/02\/CLO22_Warehouse_018.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vasu Jakkal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/vasu-jakkal\/\",\"@type\":\"Person\",\"@name\":\"Vasu Jakkal\"}],\"headline\":\"Cyber Signals: Defending against cyber threats with the latest research, insights, and trends\",\"datePublished\":\"2022-02-03T14:00:00+00:00\",\"dateModified\":\"2025-06-20T13:42:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/\"},\"wordCount\":682,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/02\/CLO22_Warehouse_018.jpg\",\"keywords\":[\"Security strategies\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/\",\"name\":\"Cyber Signals: Defending against cyber threats with the latest research, insights, and trends | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/02\/CLO22_Warehouse_018.jpg\",\"datePublished\":\"2022-02-03T14:00:00+00:00\",\"dateModified\":\"2025-06-20T13:42:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/02\/CLO22_Warehouse_018.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/02\/CLO22_Warehouse_018.jpg\",\"width\":1200,\"height\":799,\"caption\":\"Security practitioner working to investigate threats.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Signals: Defending against cyber threats with the latest research, insights, and trends\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/dce7a42a3a4e63a3350e523c420a4ad1\",\"name\":\"Emma Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=gd8de7ce2349693784c52e03d78a1422c\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g\",\"caption\":\"Emma Jones\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-coujones\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Signals: Defending against cyber threats with the latest research, insights, and trends | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Signals: Defending against cyber threats with the latest research, insights, and trends | Microsoft Security Blog","og_description":"We\u2019re excited to introduce Cyber Signals, a cyber threat intelligence brief informed by the latest Microsoft threat data and research. This content, which will be released quarterly, offers an expert perspective into the current threat landscape, discussing trending tactics, techniques, and strategies used by the world\u2019s most prolific threat actors.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/","og_site_name":"Microsoft Security Blog","article_published_time":"2022-02-03T14:00:00+00:00","article_modified_time":"2025-06-20T13:42:21+00:00","og_image":[{"width":1200,"height":799,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/02\/CLO22_Warehouse_018.jpg","type":"image\/jpeg"}],"author":"Vasu Jakkal","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/02\/CLO22_Warehouse_018.jpg","twitter_misc":{"Written by":"Vasu Jakkal","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/vasu-jakkal\/","@type":"Person","@name":"Vasu Jakkal"}],"headline":"Cyber Signals: Defending against cyber threats with the latest research, insights, and trends","datePublished":"2022-02-03T14:00:00+00:00","dateModified":"2025-06-20T13:42:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/"},"wordCount":682,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/02\/CLO22_Warehouse_018.jpg","keywords":["Security strategies"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/","name":"Cyber Signals: Defending against cyber threats with the latest research, insights, and trends | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/02\/CLO22_Warehouse_018.jpg","datePublished":"2022-02-03T14:00:00+00:00","dateModified":"2025-06-20T13:42:21+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/02\/CLO22_Warehouse_018.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/02\/CLO22_Warehouse_018.jpg","width":1200,"height":799,"caption":"Security practitioner working to investigate threats."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Signals: Defending against cyber threats with the latest research, insights, and trends"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/dce7a42a3a4e63a3350e523c420a4ad1","name":"Emma Jones","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=gd8de7ce2349693784c52e03d78a1422c","url":"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g","caption":"Emma Jones"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-coujones\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/105993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/106"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=105993"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/105993\/revisions"}],"predecessor-version":[{"id":139776,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/105993\/revisions\/139776"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/106017"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=105993"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=105993"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=105993"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=105993"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=105993"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=105993"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=105993"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=105993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}