Skip to main content
Microsoft Security

Reports

Get deep-dive analysis of cybersecurity’s most timely, relevant, and challenging topics.

Cyber Signals

A quarterly cyberthreat intelligence brief informed by the latest Microsoft threat data and research. Cyber Signals gives trends analysis and guidance to help strengthen the first line of defense.

View all articles

Cybercrime-as-a-service (CaaS) drives 38% business email fraud increase

Business email compromise (BEC) is on the rise now that cybercriminals can obscure the source of their attacks to be even more nefarious. Learn about CaaS and how to help protect your organization.

Read Cyber Signals Issue 4
Cybersecurity risks to IoT and OT devices continue to increase exposing high severity vulnerabilities for cybercrime

The convergence of IT and OT

The increasing circulation of IoT is putting OT at risk, with an array of potential vulnerabilities and exposure to threat actors. Find out how to keep your organization protected.

Read Cyber Signals Issue 3
Ransomware as a service (RaaS) is a tool that is actively exploited by cybercriminals 

Extortion economics

Hear from frontline experts on the development of ransomware as a service. From programs and payloads to access brokers and affiliates, learn about the tools, tactics, and targets cybercriminals favor, and get guidance to help protect your organization.

Read Cyber Signals Issue 2

Nation state reports

Semi-annual reports on specific nation state actors that serve to warn our customers and the global community of threats posed by influence operations and cyber activity, identifying specific sectors and regions at heightened risk.

Iran turning to cyber-enabled influence operations for greater effect

Microsoft Threat Intelligence uncovered increased cyber-enabled influence operations out of Iran. Get threat insights with details of new techniques and where the potential for future threats exists.

Learn more

The cyber and influence operations of the war in Ukraine’s digital battlefield

Microsoft threat intelligence examines a year of cyber and influence operations in Ukraine, uncovers new trends in cyber threats, and what to expect as the war enters its second year.

Learn more

CISO Insider

An actionable report that explores top of mind issues that are most relevant to CISOs in today’s threat landscape. CISO Insider provides well-founded recommendations grounded in peer experience and expert research.

Learn more
CISO Insider Issue 3 looks at emerging security priorities as organizations shift to an increasingly cloud-centric model, bringing along everything in their digital estate from on-premises systems to IoT devices.

Cloud-centric security: How leading CISOs close coverage gaps

CISOs share changing security priorities as their organizations shift to cloud-centric models and the challenges around bringing their entire digital estates along for the ride.

Read CISO Insider Issue 3
Prevent possible cybersecurity risks from ransomware and reduce emerging cyber risk factors,

Rising ransomware attacks prompt new discussion among CISOs

In this issue of CISO Insider, we hear from CISOs on what they’re seeing at the frontlines—from targets to tactics—and what steps they’re taking to help prevent and respond to attacks. We also hear how leaders are taking advantage of XDR and automation to scale their defense against sophisticated threats.

Read CISO Insider Issue 2
Learn the best practices for navigating the cyber threat landscape and strengthening your organizations cyber resilience

Attacks are constantly changing. Fundamentals of security do not.

Navigate today’s threat landscape with exclusive analysis and recommendations from security leaders.

Read CISO Insider Issue 1

Microsoft Digital Defense Report

The Microsoft Digital Defense Report provides a high-fidelity picture of the threat landscape and the current state of cybersecurity over the year, including indicators that help predict what attackers will do next.

A look at the current state of cybersecurity and the ever-changing threat landscape to cyber crime

Insights from trillions of daily security signals

Microsoft security experts illuminate today’s threat landscape, providing insights on emerging trends as well as historically persistent threats in the 2022 Microsoft Digital Defense Report.

Learn more

Special Reports

Special, standalone reports provide an opportunity to analyze challenging cybersecurity issues in depth.

View all articles
Cyber war, cyber espionage, and a general danger to cybersecurity, how the war between Russia and Ukraine has unleashed a battleground of cyber threats

Defending Ukraine: Early Lessons from the Cyber War

The latest findings in our ongoing threat intelligence efforts in the war between Russia and Ukraine, and a series of conclusions from its first four months reinforces the need for ongoing and new investments in technology, data, and partnerships to support governments, companies, NGOs, and universities.

Read the report
Understanding how security professionals are focused on cyber resilience and maximizing cybersecurity for their organization

Cyber Resilience Report

Microsoft Security conducted a survey of more than 500 security professionals to understand emerging security trends and top concerns among CISOs.

Read the report

Special Report: Ukraine

Russian threat actors have launched increasingly disruptive and visible cyberattacks against Ukraine and have included activities such as phishing, reconnaissance, and attempts to compromise public information sources.

Read the report

More from Security Insider

61% increase in phishing attacks. Know your modern attack surface.

To manage an increasingly complex attack surface, organizations must develop a comprehensive, resilient security posture. We walk through six key attack surface areas, highlight their unique challenges, and show how the right threat intelligence can help tilt the playing field in favor of defenders.

Learn more

Insights from Iranian threat actor expert Simeon Kakpovi

Senior threat intelligence analyst Simeon Kakpovi talks about training the next generation of cyber defenders and overcoming the sheer tenacity of Iranian threat actors.

See the expert profile