This is the Trace Id: a14161b74bbac14409f7be49c71ac3f2

Agents built into your everyday workflow. Read the announcement

BG image

Threat landscape

Strengthen your defenses with actionable insights and industry reports from Microsoft Threat Intelligence experts.
A blue spiral-shaped object against a neutral background.
Over an hour

Microsoft Digital Defense Report 2025

Explore the Microsoft Digital Defense Report to get the latest insights and learnings from leading Microsoft security experts, practitioners, and defenders.
5 minutes

Live from Black Hat: Ransomware, Responsible Disclosure, and the Rise of AI

5 minutes

Three Lessons from Microsoft’s Fight Against Fraud

7 minutes

10 essential insights from the Microsoft Digital Defense Report

Over an hour

Microsoft Digital Defense Report 2024

BG image

Understand them to defend against them

Get insights on active nation-state threat actors and cybercriminal organizations with analysis and updates from Microsoft Threat Intelligence.
Back to tabs

Inside Microsoft Threat Intelligence video series

  • Microsoft disrupted Storm-1152’s 750 million fake accounts. See how threat intelligence becomes action, disruption, and protection.

    Watch episode one
  • When threat actors strike, Microsoft’s Incident Response team steps into the chaos to bring calm and structure to the equation.

    Watch episode two
  • Follow Senior Security Researcher Thomas Ball in the latest episode of Inside Microsoft Threat Intelligence as he discusses modern threat hunting in the age of AI.

    Watch episode three
  • Explore the foundation that fuels it all–security research–through the lens of Principal Security Researcher Jonathan Bar Or (JBO).

    Watch episode four

Threat actors

A yellow folder with the text Microsoft Security The Microsoft Threat Intelligence Podcast placed against a blue background.
40 minutes

Get a pulse check on the state of ransomware

A person holding a tablet in a room.
13 minutes

Finding bootloader vulnerabilities faster with AI

A yellow folder with the text Microsoft Security The Microsoft Threat Intelligence Podcast placed against a blue background.
28 minutes

How threat actors exploit remote monitoring and management

A store display with various signs including numerical text and phrases about brands, sales, and cyber-related topics.
12 minutes

AI-powered deception: Emerging fraud threats and countermeasures

Two people talking to each other.
13 minutes

How Silk Typhoon compromises supply chains

A night view of a glass building.
23 minutes

The tactics, techniques, and procedures of a Seashell Blizzard subgroup

A man wearing headphones on his neck looking at a computer screen.
32 minutes

Understand and mitigate a large-scale malvertising campaign

A person sitting at a desk typing on a laptop.
13 minutes

Threat actors use tax-themed phishing during tax season

A man and two woman sitting on chairs and addressing media.
2 minutes

How threat actors are using AI now—and what’s next

BG image

Reports

A pink and white swirl on a purple background with white dots.
7 minutes

10 essential insights from the Microsoft Digital Defense Report

A group of medical professionals looking at a clipboard.
6 minutes

Tackling healthcare-targeted ransomware. Together.

A person shadow on mobile screen.
10 minutes

Manipulating trust: Why social engineering fraud works

A colorfull shine with black background.
Over an hour

Microsoft Digital Defense Report 2024

A city skyline with a sunset behind it.
20 minutes

Microsoft Digital Defense Report 2023: CISO Executive Summary

A close-up of a blue surface.
Over an hour

Microsoft Digital Defense Report 2023

A blue and green background with dots.
Over an hour

Microsoft Digital Defense Report 2022

A blue line on a black background.
Over an hour

Microsoft Digital Defense Report 2021

A purple and black background with dotted patterns.
Over an hour

Microsoft Digital Defense Report 2020

 bg image

Connect with us

Follow Microsoft Security