Threat briefs
Threat briefs provide concise, actionable, and relevant analysis of current and past cybersecurity threats.
Cadet Blizzard emerges as a novel and distinct Russian threat actor
06/27/2023Microsoft attributes several campaigns to a distinct Russian state-sponsored threat actor tracked as Cadet Blizzard, including the WhisperGate destructive attack, Ukrainian website defacements, and the hack-and-leak front “Free Civilian”.
Learn more
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques
05/25/2023
Chinese state-sponsored threat actor Volt Typhoon has been observed using stealthy techniques to target US critical infrastructure, conduct espionage, and dwell in compromised environments.
Learn More
61% increase in phishing attacks. Know your modern attack surface.
05/02/2023
To manage an increasingly complex attack surface, organizations must develop a comprehensive security posture. With six key attack surface areas, this report will show you how the right threat intelligence can help tilt the playing field in favor of defenders.
Learn more
Stopping cybercriminals from abusing security tools
04/07/2023
Microsoft, Fortra™, and Health Information Sharing and Analysis Center partner to take technical and legal action to disrupt “cracked” legacy copies of Cobalt Strike, used by cybercriminals to distribute malware, including ransomware.
Learn more
Security is only as good as your threat intelligence
04/05/2023
More reinforcements have arrived. John Lambert, Threat intelligence leader explains how AI enhances the threat intelligence community.
Learn more
Industry expert weighs in on security in manufacturing
04/04/2023
Industry expert Myrna Soto breaks down the state of cybersecurity across manufacturing, discussing the sector’s emerging risks and opportunities, future legislative developments, and best practices to help strengthen defenses.
Watch video
Pervasive. Quick. Disruptive. 520,000 unique attacks examined.
03/03/2023
Preempt distributed denial-of-service (DDoS) attacks with up-to-date analysis of DDoS attacks from 2022 and best practices for defense.
Learn more
MagicWeb exploit: Solving one of NOBELIUM’s most novel attacks
02/16/2023
Get an inside look at how Microsoft threat intelligence investigated this never-before-seen attack. Learn about the attack flow, review real-time response details, and prepare yourself with strategies for avoiding similar attacks.
Read now
Iran responsible for Charlie Hebdo Attacks
02/03/2023
Microsoft is attributing a recent influence operation targeting French magazine Charlie Hebdo to an Iranian nation-state actor Microsoft tracks as NEPTUNIUM.
Read article
Learn the ABCs of Threat Hunting
01/20/2023
When it comes to cyber security, it helps to be vigilant. Here’s how to hunt, identify, and mitigate new and emerging threats.
Read now
Protecting yourself from holiday-season DDoS attacks
12/21/2022
’Tis the season for distributed denial of service (DDoS) attacks. See what drives criminals to increase DDoS activity during the holidays and learn what you can do to help protect your organization.
Learn More
Rising cyber threats in response to expanding IoT/OT connectivity
12/14/2022
In our latest report, we explore how increasing IoT/OT connectivity is leading to greater and more-severe vulnerabilities for organized cyber threat actors to exploit.
Learn More
Propaganda in the digital age: How cyber influence operations erode trust
11/09/2022
Survey the world of cyber influence operations, where nation states distribute propaganda designed to threaten the trustworthy information democracy requires to flourish.
Learn More
Cyberthreat Minute: The scale and scope of worldwide cybercrime in 60 seconds
08/01/2022
During a cyberattack, every second counts. To illustrate the scale and scope of worldwide cybercrime, we’ve condensed a year’s worth of cybersecurity research into one 60-second window.
Learn more
Three ways to protect yourself from ransomware
06/30/2022
Modern ransomware defense requires a lot more than just setting up detection measures. Discover the top three ways you can harden your network’s security against ransomware today.
Learn more
Protect your organization from ransomware
06/22/2022
Get a glimpse of the criminal players who operate within the underground ransomware economy. We’ll help you understand the motivations and mechanics of ransomware attacks and provide you with best practices for protection as well as backup and recovery.
Read article
Ransomware-as-a-service: The new face of industrialized cybercrime
05/25/2022
Cybercrime’s newest business model, human-operated attacks, emboldens criminals of varying ability.
Learn more
Anatomy of an external attack surface
04/19/2022
The cybersecurity world continues to become more complex as organizations move to the cloud and shift to decentralized work. Today, the external attack surface spans multiple clouds, complex digital supply chains, and massive third-party ecosystems.
Learn more
Using cybersecurity to help manage volatility in the global threat landscape
04/06/2022
As cyber threats evolve, it can be tough to prioritize the right steps to take to keep your organization safe. To remain proactive in your cybersecurity efforts, follow these essential steps to help stay ahead of potential threats.
Learn moreMore from Security Insider
Digital threats from Asia Pacific
Several emerging trends illustrate a quickly changing threat landscape across East Asia, with China conducting both widespread cyber and influence operations (IO), and North Korean cyber threat actors demonstrating increased sophistication.
Learn more
Insights from Iranian threat actor expert Simeon Kakpovi
Senior threat intelligence analyst Simeon Kakpovi talks about training the next generation of cyber defenders and overcoming the sheer tenacity of Iranian threat actors.
See the expert profile