Skip to main content
Microsoft Security

Threat briefs

Threat briefs provide concise, actionable, and relevant analysis of current and past cybersecurity threats.

Cadet Blizzard emerges as a novel and distinct Russian threat actor

06/27/2023

Microsoft attributes several campaigns to a distinct Russian state-sponsored threat actor tracked as Cadet Blizzard, including the WhisperGate destructive attack, Ukrainian website defacements, and the hack-and-leak front “Free Civilian”.

Learn more

Volt Typhoon targets US critical infrastructure with living-off-the-land techniques

05/25/2023

Chinese state-sponsored threat actor Volt Typhoon has been observed using stealthy techniques to target US critical infrastructure, conduct espionage, and dwell in compromised environments.

Learn More

61% increase in phishing attacks. Know your modern attack surface.

05/02/2023

To manage an increasingly complex attack surface, organizations must develop a comprehensive security posture. With six key attack surface areas, this report will show you how the right threat intelligence can help tilt the playing field in favor of defenders.

Learn more
icons with red background

Stopping cybercriminals from abusing security tools

04/07/2023

Microsoft, Fortra™, and Health Information Sharing and Analysis Center partner to take technical and legal action to disrupt “cracked” legacy copies of Cobalt Strike, used by cybercriminals to distribute malware, including ransomware.

Learn more

Security is only as good as your threat intelligence

04/05/2023

More reinforcements have arrived. John Lambert, Threat intelligence leader explains how AI enhances the threat intelligence community.

Learn more
Picture of expert Myrna Soto

Industry expert weighs in on security in manufacturing

04/04/2023

Industry expert Myrna Soto breaks down the state of cybersecurity across manufacturing, discussing the sector’s emerging risks and opportunities, future legislative developments, and best practices to help strengthen defenses.

Watch video

Pervasive. Quick. Disruptive. 520,000 unique attacks examined.

03/03/2023

Preempt distributed denial-of-service (DDoS) attacks with up-to-date analysis of DDoS attacks from 2022 and best practices for defense.

Learn more

MagicWeb exploit: Solving one of NOBELIUM’s most novel attacks

02/16/2023

Get an inside look at how Microsoft threat intelligence investigated this never-before-seen attack. Learn about the attack flow, review real-time response details, and prepare yourself with strategies for avoiding similar attacks.

Read now
Cybersecurity spotlight: the cyber risks associated with the convergence of IT and OT

Iran responsible for Charlie Hebdo Attacks

02/03/2023

Microsoft is attributing a recent influence operation targeting French magazine Charlie Hebdo to an Iranian nation-state actor Microsoft tracks as NEPTUNIUM.

Read article
Take crucial steps to prevent malware attacks and maintain cyber resilience with this comprehensive guide to threat hunting

Learn the ABCs of Threat Hunting

01/20/2023

When it comes to cyber security, it helps to be vigilant. Here’s how to hunt, identify, and mitigate new and emerging threats.

Read now
During the holidays cybercriminals will leverage distributed denial-of-service (DDoS) attacks in the form of volumetric, protocol, and resource layer attacks. Find out how you can protect your business

Protecting yourself from holiday-season DDoS attacks

12/21/2022

’Tis the season for distributed denial of service (DDoS) attacks. See what drives criminals to increase DDoS activity during the holidays and learn what you can do to help protect your organization.

Learn More
The rising cyber threats to IoT and OT devices

Rising cyber threats in response to expanding IoT/OT connectivity

12/14/2022

In our latest report, we explore how increasing IoT/OT connectivity is leading to greater and more-severe vulnerabilities for organized cyber threat actors to exploit.

Learn More
Cyber influence operations continue to become increasingly sophisticated and prevalent. Since 2019 there has been a 900% year-over-year increase in proliferation of deepfakes

Propaganda in the digital age: How cyber influence operations erode trust

11/09/2022

Survey the world of cyber influence operations, where nation states distribute propaganda designed to threaten the trustworthy information democracy requires to flourish.

Learn More
Cybercrime continues to be a growing threat. Within a 60-second window there are 34,740 password attacks, 1,902 IoT based attacks, and 1,095 DDoS attacks that can lead to a loss of 1,141,533 USD.

Cyberthreat Minute: The scale and scope of worldwide cybercrime in 60 seconds

08/01/2022

During a cyberattack, every second counts. To illustrate the scale and scope of worldwide cybercrime, we’ve condensed a year’s worth of cybersecurity research into one 60-second window.  

Learn more
Learn how to protect your organization against ransomware attacks and improve your network’s cybersecurity

Three ways to protect yourself from ransomware

06/30/2022

Modern ransomware defense requires a lot more than just setting up detection measures. Discover the top three ways you can harden your network’s security against ransomware today.

Learn more
Person seating in front of computer screens

Protect your organization from ransomware

06/22/2022

Get a glimpse of the criminal players who operate within the underground ransomware economy. We’ll help you understand the motivations and mechanics of ransomware attacks and provide you with best practices for protection as well as backup and recovery.

Read article
Ransomware-as-a-service (RaaS) is becoming the growing trend in cybercrime

Ransomware-as-a-service: The new face of industrialized cybercrime

05/25/2022

Cybercrime’s newest business model, human-operated attacks, emboldens criminals of varying ability.

Learn more
Using zero trust principles to protect devices, applications, and data

Anatomy of an external attack surface

04/19/2022

The cybersecurity world continues to become more complex as organizations move to the cloud and shift to decentralized work. Today, the external attack surface spans multiple clouds, complex digital supply chains, and massive third-party ecosystems.

Learn more
Cybersecurity hygiene can be used to prevent 98% of cyberattacks and ensure ransomware and cyber extortion protection

Using cybersecurity to help manage volatility in the global threat landscape

04/06/2022

As cyber threats evolve, it can be tough to prioritize the right steps to take to keep your organization safe. To remain proactive in your cybersecurity efforts, follow these essential steps to help stay ahead of potential threats.

Learn more

More from Security Insider

Digital threats from Asia Pacific

Several emerging trends illustrate a quickly changing threat landscape across East Asia, with China conducting both widespread cyber and influence operations (IO), and North Korean cyber threat actors demonstrating increased sophistication.

Learn more

Insights from Iranian threat actor expert Simeon Kakpovi

Senior threat intelligence analyst Simeon Kakpovi talks about training the next generation of cyber defenders and overcoming the sheer tenacity of Iranian threat actors.

See the expert profile