Trace Id is missing

Business Email Compromise (BEC)

A close-up of a smartphone
Emerging threats

Breaking down business email compromise

Digital crimes expert Matt Lundy provides business email compromise examples, breaking down one of the most common and costly forms of cyberattack.
A person with a mustache smiling
Meet the experts

Expert Profile: Dustin Duran

Threat intelligence expert Dustin Duran explains how his team adopts a threat actor mindset to better understand their adversaries and help keep customer organizations and security centers safe.
A screenshot of a video game
Emerging threats

Shifting tactics fuel surge in business email compromise

Business email compromise (BEC) is on the rise now that cybercriminals can obscure the source of their attacks to be even more nefarious. Learn about CaaS and how to help protect your organization.
A person in a suit
Meet the experts

Insights from Iranian threat actor expert Simeon Kakpovi

Senior threat intelligence analyst Simeon Kakpovi talks about training the next generation of cyber defenders and overcoming the sheer tenacity of Iranian threat actors.
Abstract graphic of concentric circles in green, yellow, and white on a gray background.
Get started

Join Microsoft events

Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
A woman reading from a tablet while standing outside a building.
Talk to us

Join Microsoft’s tech community

Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.

Follow Microsoft