Explore the latest cybersecurity insights and updates.
Ransomware’s new business model
Cyber Signals: Extortion economics
Threat Actor Insights
Microsoft Security is actively tracking threat actors across observed nation state, ransomware, and criminal activities. These insights represent publicly published activity from Microsoft Security threat researchers and provide a centralized catalog of actor profiles from the referenced blogs.
Behind the scenes
Walk through the world of attack surface management
Steve Ginty, director of cyber intelligence at Microsoft, talks about the importance of knowing your external attack surface, provides tips on effective security readiness, and identifies the most important step you can take to protect yourself against threat actors online.
Human operated ransomware—what it is and how to protect your organization from attack
Human operated ransomware is one of the most prevalent and top-of-mind threats for security professionals. Join our technical research team and learn about what developments Microsoft is seeing in the threat landscape, as well as how we can help your business mitigate these types of attacks.
Building Resilience: Countering Foreign Influence Operations with Brad Smith
Microsoft president and vice chair, Brad Smith provided opening remarks at an event hosted by the Reagan Institute’s Center for Freedom and Democracy, Countering Foreign Influence Operations: Developing a Whole of Society Approach to Build Resilience.
Trending blogs and articles
Continuing the fight against private sector cyberweaponsJuly 27, 2022
Commercialized cyberweapons continue to threaten consumers, businesses and governments. Microsoft believes that allowing private sector offensive actors, or PSOAs, to develop and sell surveillance and intrusion capabilities to unscrupulous governments and business interests endangers basic human rights.
Toll fraud malware: How an Android application can drain your walletJune 30, 2022
When it comes to data security, your workstation isn’t the only target. In this blog, we break down an emerging threat targeting Android users signing up for premium subscriptions and draining their accounts.
Improving AI-based defenses to disrupt human-operated ransomwareJune 21, 2022
In the fight against emerging cyberthreats, attacks can take many forms and origin points. In this exploration, we dive into the tactics of human-operated ransomware attacks and how AI is becoming a growing ally in our defense.
The many lives of Blackcat ransomwareJune 13, 2022
With the growing use of Blackcat ransomware attacks it’s important that organizations evaluate their defense strategies. In this blog we look at the origins and tactics of Blackcat ransomware and how you can be proactive in your defense.
Exposing POLONIUM activity and infrastructure targeting Israeli organizationsJune 2, 2022
The Lebanese threat group, POLONIUM appears to have launched several attacks at various Israeli organizations. In this blog, we take a closer look at the history of this group, and what their activity means for cybersecurity abroad.
How to improve risk management using Zero Trust architectureMay 23, 2022
Risk management is a core aspect of decision-making for any business. Here we detail the role of Zero Trust architecture and its use in improving risk management across various industries and organizations.