Trace Id is missing
A person typing on a keyboard.
Cybercrime

Egypt-based cybercriminal supplier’s websites seized

Microsoft's Digital Crimes Unit, in partnership with LF (Linux Foundation) Projects, seized 240 phishing sites, disrupting a cybercriminal operation targeting many sectors, including financial institutions. This action disrupts the cybercrime supply chain and helps protect users from downstream threats, including financial fraud, data theft, and ransomware.
A close-up of colorful circles with icons.
Cybercrime

Bold action against fraud: Disrupting Storm-1152

Look back on the Storm-1152 enforcement action, a multiteam effort combining threat intelligence, legal action, and industry partnership to disrupt a major cybercrime-as-a-service provider responsible for more than 750 million fraudulent Microsoft accounts.
A person's hand typing on a keyboard with a translucent digital login interface overlay, featuring username and password fields.
Cybercrime

Disrupting the gateway services to cybercrime

Microsoft, with threat intelligence support from Arkose Labs, is taking technical and legal action to disrupt the number one seller and creator of fraudulent Microsoft accounts, a group we call Storm-1152. We are watching, taking notice, and will act to protect our customers.
Headphones resting on an open laptop keyboard, with a blurred green natural backdrop visible through a round cutout.
Cybercrime

Microsoft, Amazon, and international law enforcement unite to fight tech support fraud

See how Microsoft and Amazon joined forces for the first time ever to take down illegal tech support call centers across India.
Illustration of a laptop and a smartphone with matching lock screen icons, surrounded by floating red spheres,
Cyber hygiene

Basic cyber hygiene prevents 99% of attacks

Basic cyber hygiene remains the best way to defend an organization’s identities, devices, data, apps, infrastructure, and networks against 98% of all cyber threats. Discover practical tips in a comprehensive guide.
Three professionals—a young black woman, a middle-aged white woman, and an older white man sit at a table, appearing thoughtful
Cracked Software

Inside the fight against hackers who disrupted hospitals and jeopardized lives

Go behind the scenes in a joint operation between Microsoft, software maker Fortra, and Health-ISAC to disrupt cracked Cobalt Strike servers and make it harder for cybercriminals to operate.
IcStopping cybercriminals from abusing security tools icon on red background
Cybercrime

Stopping cybercriminals from abusing security tools

Microsoft, Fortra™, and Health Information Sharing and Analysis Center partner to take technical and legal action to disrupt “cracked” legacy copies of Cobalt Strike, used by cybercriminals to distribute malware, including ransomware.
A graphic illustration showing a glowing yellow sphere with red beams pointing towards it from above, all against a dark blue background.
DDoS

Pervasive. Quick. Disruptive. 520,000 unique attacks examined.

Pre-empt distributed denial-of-service (DDoS) attacks with up-to-date analysis of DDoS attacks from 2022 and best practices for defense.
Logo featuring the letter 'a' designed with arrows and accompanied by stylized letters 'b' and 'c' on a dark blue background.
Threat hunting

Learn the ABCs of Threat Hunting

Explore the ABCs of Threat Hunting Guide to get tips on how to hunt, identify, and mitigate cyberthreats to help become more cyber-resilient.
Protect yourself against ransomware as a service (RaaS) and malware attacks
Ransomware

Three ways to protect yourself from ransomware

Modern ransomware defense requires a lot more than just setting up detection measures. Discover the top three ways you can harden your network’s security against ransomware today.
Two professionals, a man and a woman, collaborating at a computer in an office setting.
Cybersecurity

Using cybersecurity to help manage volatility in the global threat landscape

As cyber threats evolve, it can be tough to prioritize the right steps to take to keep your organization safe. To remain proactive in your cybersecurity efforts, follow these essential steps to help stay ahead of potential threats.
A bald man in a blue shirt using a tablet in a warehouse surrounded by boxes.
CISO Insider

Issue 1

Navigate today’s threat landscape with perspectives from CISOs, exclusive analysis, and recommendations from security leaders.
A professional woman using a tablet in an industrial setting with a green circle graphic overlay on the right.
CISO Insider

Issue 2

In this issue of CISO Insider, we hear from CISOs on what they’re seeing at the frontlines—from targets to tactics—and what steps they’re taking to help prevent and respond to attacks. We also hear how leaders are taking advantage of XDR and automation to scale their defense against sophisticated threats.
A man in a beige coat using a smartphone in a busy street, highlighted by a yellow circle, with blurred pedestrians in the background.
CISO Insider

Issue 3

CISOs share changing security priorities as their organizations shift to cloud-centric models and the challenges around bringing their entire digital estates along for the ride.
Abstract graphic of concentric circles in green, yellow, and white on a gray background.
A man delivers a speech at a conference podium, facing an audience with a large, colorful abstract background displayed on the screen
Get started

Join Microsoft events

Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
A woman reading from a tablet while standing outside a building.
Talk to us

Join Microsoft’s tech community

Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.

Follow Microsoft Security