Trace Id is missing

Intelligence reports

Microsoft Digital Defense Report

A city skyline with a sunset behind it
Microsoft Digital Defense Report

Microsoft Digital Defense Report 2023: CISO Executive Summary

The CISO Executive Summary provides an introduction by Microsoft CISO Bret Arsenault and gives an in-depth, narrative-style summary, highlighting key points of interest for modern chief information security officers. 
Microsoft Digital Defense Report

Microsoft Digital Defense Report 2023: Building cyber resilience

The latest edition of the Microsoft Digital Defense Report explores the evolving threat landscape and walks through opportunities and challenges as we become cyber resilient.
A close-up of a skyscraper
Microsoft Digital Defense Report

Microsoft Digital Defense Report 2023: Executive Summary

The Executive Summary provides an introduction on the threat landscape by Tom Burt, along with the top headlines from the reports five main chapters: The State of Cybercrime; Nation State Threats; Critical Cybersecurity Challenges; Innovating for Security and Resilience; and Collective Defense. 
Microsoft Digital Defense Report

Microsoft Digital Defense Report 2022

In the 2022 edition of the Microsoft Digital Defense Report, Microsoft security experts illuminate today’s threat landscape, providing insights on emerging trends as well as historically persistent threats in the 2022 Microsoft Digital Defense Report.
Microsoft Digital Defense Report

Microsoft Digital Defense Report 2021

The 2021 edition Microsoft Digital Defense Report draws on insights, data, and more from trillions of daily security signals from across Microsoft, including the cloud, endpoints, and the intelligent edge.
Microsoft Digital Defense Report

Microsoft Digital Defense Report 2020

Introducing the Microsoft Digital Defense Report, a reimagining of the annual Microsoft Security Intelligence Report (SIR) published since 2005.

Cyber signals

A laptop with gift cards and credit cards flying out of it
Cyber signals

Inside the growing risk of gift card fraud

Discover why companies issuing gift or payment cards are the favored targets of Storm-0539, a Morocco-based threat actor leveraging cloud environments to attack gift card portals. Review the group’s methods and learn ways to strengthen defenses against their attacks.
A group of people standing on blocks
Cyber signals

Navigating cyberthreats and strengthening defenses in the era of AI

Advances in artificial intelligence (AI) present new threats—and opportunities—for cybersecurity. Discover how threat actors use AI to conduct more sophisticated attacks, then review the best practices that help protect against traditional and AI-enabled cyberthreats.
A close-up of a tennis court
Cyber signals 

Cyberthreats increasingly target the world’s biggest event stages

Complex and target-rich, major sporting events and world-renown activities present opportunities for threat actors to disrupt travel, commerce, communication and emergency services, and more. Learn how to manage the vast, external attack surface and defend world event infrastructures.
A screenshot of a video game
Cyber signals

Shifting tactics fuel surge in business email compromise

Business email compromise (BEC) is on the rise now that cybercriminals can obscure the source of their attacks to be even more nefarious. Learn about CaaS and how to help protect your organization.
A computer network with icons
Cyber signals

The convergence of IT and OT

Prevent 98% of cyberattacks against IoT and OT devices. Learn how cybersecurity hygiene can be used to protect against ransomware and cyber extortion.
A colorful yellow white circle with dots
Cyber signals 

Extortion economics

Ransomware, one of the most persistent and pervasive cyber threats, continues to evolve. Here is an in-depth look at ransomware as a service (Raas), the latest tool of cybercrime.
A close-up of a person looking at computer
Cyber signals
 •  Dec 2023

Identity is the new battleground

Identity-based attacks are the latest targets in the world of cybercrime. Learn how to get help protect your organization from identity-based cyber threats.

Nation state

A photo of a building which have a large watch with text PARIS 2024
Nation state

How Russia is trying to disrupt the 2024 Paris Olympic Games

Russian influence actors are adding AI to a decades-long legacy of disinformation aimed at the Olympic Games. Attempts to smear the reputation of the International Olympic Committee at this summer’s games in Paris, as well as multiple efforts to create an expectation of violence during the event, are expected to intensify as the games near.
Abstract illustration of a naval ship with graphic red circles and black mesh elements against a pink background.
Nation state

Same targets, new playbooks: East Asia threat actors employ unique methods

Microsoft Threat Intelligence has observed several key cyber and influence trends from China and North Korea since June 2023 that demonstrate not only doubling down on familiar targets, but also attempts to use more sophisticated influence techniques to achieve their goals.
Illustration of a padlock, digital connections, a loudspeaker, and four human figures, symbolizing security and communication
Nation state

Iran surges cyber-enabled influence operations in support of Hamas

Discover details of Iran’s cyber-enabled influence operations supporting Hamas in Israel. Learn how operations have progressed through different phases of the war, and examine the four key influence tactics, techniques, and procedures (TTPs) Iran favors most.
A computer screen with icons and symbols
Nation state

Russian threat actors dig in, prepare to seize on war fatigue

Russian cyber and influence operations persist as the war in Ukraine continues. Microsoft Threat Intelligence details the latest cyber threat and influence activities over the last six months.
A person sitting in a bean bag with a computer and a laptop
Nation state

Digital threats from East Asia increase in breadth and effectiveness

Dive in and explore emerging trends in East Asia’s evolving threat landscape, where China conducts both widespread cyber and influence operations (IO), while North Korean cyber threat actors demonstrate growing sophistication.
A computer screen with a key and a person's head
Nation state

Iran turning to cyber-enabled influence operations for greater effect

Microsoft Threat Intelligence uncovered increased cyber-enabled influence operations out of Iran. Get threat insights with details of new techniques and where the potential for future threats exists.
A computer servers and shield
Nation state

The cyber and influence operations of the war in Ukraine’s digital battlefield

Microsoft threat intelligence examines a year of cyber and influence operations in Ukraine, uncovers new trends in cyber threats, and what to expect as the war enters its second year.

Special Reports

Graphic illustration showing a laptop with tax documents on screen, paper documents flying into a folder marked 'tax'
Special Reports

Tax season cybersecurity: What cybercriminals want and who they target most. Is it you?

The tax man, and phishing campaigns, cometh. Microsoft Threat Intelligence reviews what criminals target, how they get it (including details from a newly observed 2024 campaign), and the best practices for keeping businesses and individuals (especially vulnerable populations) safe.
Special Reports

Defending Ukraine: Early Lessons from the Cyber War

How cyber-attacks and cyber influence operations are being used in the war between Russian and the Ukraine.
A map of europe with different countries/regions
Special Reports

Special Report: Ukraine

Russian threat actors have launched increasingly disruptive and visible cyberattacks against Ukraine and have included activities such as phishing, reconnaissance, and attempts to compromise public information sources.
A blue background with white circles and red dots
Nation state

Cyber Resilience

Learn five fundamental steps to enhance your organizations cyber resilience and help protect against ransomware and other malicious cyberattacks.
Abstract graphic of concentric circles in green, yellow, and white on a gray background.
Woman reading a book on a leather sofa in a cozy living room setting.
Get started

Join Microsoft events

Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
A woman reading from a tablet while standing outside a building.
Talk to us

Join Microsoft’s tech community

Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.

Follow Microsoft