Skip to main content
Microsoft Security

Security Insider

Explore the latest cybersecurity insights and updates.

Threat watch

Anatomy of an external attack surface: Five elements organizations should monitor
April 19, 2022

The cybersecurity world continues to become more complex as organizations move to the cloud and shift to decentralized work. Today, the external attack surface spans multiple clouds, complex digital supply chains, and massive third-party ecosystems.

Cyber Signals Issue 2: Extortion Economics
August 22, 2022

Hear from frontline experts on the development of ransomware as a service. From programs and payloads to access brokers and affiliates, learn about the tools, tactics, and targets cybercriminals favor, and get guidance to help protect your organization.

Defending Ukraine: Early Lessons from the Cyber War
June 22, 2022

The latest findings in our ongoing threat intelligence efforts in the war between Russia and Ukraine, and a series of conclusions from its first four months reinforces the need for ongoing and new investments in technology, data, and partnerships to support governments, companies, NGOs, and universities.

Ransomware, evolved: Meet the threat players, learn about the attack phases, and prepare your defense
June 22, 2022

Get a glimpse of the criminal players who operate within the underground ransomware economy. We’ll help you understand the motivations and mechanics of ransomware attacks and provide you with best practices for protection as well as backup and recovery.

Ransomware as a service The new face of industrialized cybercrime
May 25, 2022

Cybercrime’s newest business model, human-operated attacks, emboldens criminals of varying ability.

Special Report: Ukraine 
April 27, 2022

Microsoft shares insights into cyberattacks against Ukraine, highlighting details in the attack and context around the scope, scale, and methods of Russia-based nation state attackers.

Using cybersecurity to help manage volatility in the global threat landscape
April 6, 2022

As cyber threats evolve, it can be tough to prioritize the right steps to take to keep your organization safe. To remain proactive in your cybersecurity efforts, follow these essential steps to help stay ahead of potential threats.

Cyber Signals Issue 1: Identity
February 9, 2022

Identity is the new battleground. Gain insights into evolving cyberthreats and what steps to take to better protect your organization.

Behind the scenes

Discover how cybercriminals use tactics like social engineering to perpetrate attacks
November 1, 2022

Matt Lundy of the Microsoft Digital Crimes Unit (DCU) describes how the experts of the Identity and Platform Enforcement team help keep customers safe from threats like ransomware, business email compromise, and homoglyph domains.

Threat intelligence expert Emily Hacker
August 22, 2022

Threat Intelligence Analyst Emily Hacker discusses how her team stays on top of the changing ransomware as a service landscape and the measures they take to help catch pre-ransomware actors.

Behind the scenes with cybercrime and counter ransomware expert Nick Carr
June 22, 2022

Nick Carr, Cybercrime Intelligence Team Lead at the Microsoft Threat Intelligence Center, discusses ransomware trends, explains what Microsoft is doing to protect customers from ransomware, and describes what organizations can do if they’ve been affected by it.

Behind the scenes with threat intelligence expert Steve Ginty 
May 12, 2022

Steve Ginty, director of cyber intelligence at Microsoft, talks about the importance of knowing your external attack surface, provides tips on effective security readiness, and identifies the most important step you can take to protect yourself against threat actors online.

Expert analysis from inside the Microsoft Security Response Center (MSRC)
May 6, 2022

Spend a moment behind the scenes with the MSRC’s Russ McRee, who shares his thoughts on the state of modern security. 

Perspectives

Propaganda in the digital age: How cyber influence operations erode trust
November 9, 2022

Survey the world of cyber influence operations, where nation states distribute propaganda designed to threaten the trustworthy information democracy requires to flourish.

Insights from 43 trillion daily security signals
November 1, 2022

Microsoft security experts illuminate today’s threat landscape, providing insights on emerging trends as well as historically persistent threats.

CISO Insider Issue 2
October 12, 2022

In this issue of CISO Insider, we hear from CISOs on what they’re seeing at the frontlines—from targets to tactics—and what steps they’re taking to help prevent and respond to attacks. We also hear how leaders are taking advantage of XDR and automation to scale their defense against sophisticated threats.

Cyberthreat Minute: The scale and scope of worldwide cybercrime in 60 seconds
August 1, 2022

During a cyberattack, every second counts. To illustrate the scale and scope of worldwide cybercrime, we’ve condensed a year’s worth of cybersecurity research into one 60-second window.  

Three ways to protect yourself from ransomware
June 30, 2022

Modern ransomware defense requires a lot more than just setting up detection measures. Discover the top three ways you can harden your network’s security against ransomware today.

Cyber Resilience Report
May 13, 2022

Microsoft Security conducted a survey of more than 500 security professionals to understand emerging security trends and top concerns among CISOs.

CISO Insider Issue 1
February 9, 2022

Navigate today’s threat landscape with exclusive analysis and recommendations from security leaders.

Learn more about cybersecurity solutions

Follow Microsoft