Trace Id is missing

Intelligence reports

Microsoft Digital Defense Report

A city skyline with a sunset behind it
Microsoft Digital Defense Report

Microsoft Digital Defense Report 2023: CISO Executive Summary

The CISO Executive Summary provides an introduction by Microsoft CISO Bret Arsenault and gives an in-depth, narrative-style summary, highlighting key points of interest for modern chief information security officers. 
Microsoft Digital Defense Report

Microsoft Digital Defense Report 2023: Building cyber resilience

The latest edition of the Microsoft Digital Defense Report explores the evolving threat landscape and walks through opportunities and challenges as we become cyber resilient.
A close-up of a skyscraper
Microsoft Digital Defense Report

Microsoft Digital Defense Report 2023: Executive Summary

The Executive Summary provides an introduction on the threat landscape by Tom Burt, along with the top headlines from the reports five main chapters: The State of Cybercrime; Nation State Threats; Critical Cybersecurity Challenges; Innovating for Security and Resilience; and Collective Defense. 
Microsoft Digital Defense Report

Microsoft Digital Defense Report 2022

In the 2022 edition of the Microsoft Digital Defense Report, Microsoft security experts illuminate today’s threat landscape, providing insights on emerging trends as well as historically persistent threats in the 2022 Microsoft Digital Defense Report.
Microsoft Digital Defense Report

Microsoft Digital Defense Report 2021

The 2021 edition Microsoft Digital Defense Report draws on insights, data, and more from trillions of daily security signals from across Microsoft, including the cloud, endpoints, and the intelligent edge.
Microsoft Digital Defense Report

Microsoft Digital Defense Report 2020

Introducing the Microsoft Digital Defense Report, a reimagining of the annual Microsoft Security Intelligence Report (SIR) published since 2005.

Cyber signals

A close-up of a tennis court
Cyber signals

Cyberthreats increasingly target the world’s biggest event stages

Complex and target-rich, major sporting events and world-renown activities present opportunities for threat actors to disrupt travel, commerce, communication and emergency services, and more. Learn how to manage the vast, external attack surface and defend world event infrastructures.
A screenshot of a video game
Cyber signals

Shifting tactics fuel surge in business email compromise

Business email compromise (BEC) is on the rise now that cybercriminals can obscure the source of their attacks to be even more nefarious. Learn about CaaS and how to help protect your organization.
A computer network with icons
Cyber signals 
 •  Dec 2023

The convergence of IT and OT

Prevent 98% of cyberattacks against IoT and OT devices. Learn how cybersecurity hygiene can be used to protect against ransomware and cyber extortion.
A colorful yellow white circle with dots
Cyber signals
 •  Dec 2023

Extortion economics

Ransomware, one of the most persistent and pervasive cyber threats, continues to evolve. Here is an in-depth look at ransomware as a service (Raas), the latest tool of cybercrime.
A close-up of a person looking at computer
Cyber signals

Identity is the new battleground

Identity-based attacks are the latest targets in the world of cybercrime. Learn how to get help protect your organization from identity-based cyber threats.

Nation state

A computer screen with icons and symbols
Nation state

Russian threat actors dig in, prepare to seize on war fatigue

Russian cyber and influence operations persist as the war in Ukraine continues. Microsoft Threat Intelligence details the latest cyber threat and influence activities over the last six months.
A person sitting in a bean bag with a computer and a laptop
Nation state

Digital threats from East Asia increase in breadth and effectiveness

Dive in and explore emerging trends in East Asia’s evolving threat landscape, where China conducts both widespread cyber and influence operations (IO), while North Korean cyber threat actors demonstrate growing sophistication.
A computer screen with a key and a person's head
Nation state
 •  Dec 2023

Iran turning to cyber-enabled influence operations for greater effect

Microsoft Threat Intelligence uncovered increased cyber-enabled influence operations out of Iran. Get threat insights with details of new techniques and where the potential for future threats exists.
A computer servers and shield
Nation state

The cyber and influence operations of the war in Ukraine’s digital battlefield

Microsoft threat intelligence examines a year of cyber and influence operations in Ukraine, uncovers new trends in cyber threats, and what to expect as the war enters its second year.

Special Reports

Special Reports

Defending Ukraine: Early Lessons from the Cyber War

How cyber-attacks and cyber influence operations are being used in the war between Russian and the Ukraine.
A map of europe with different countries/regions
Special Reports

Special Report: Ukraine

Russian threat actors have launched increasingly disruptive and visible cyberattacks against Ukraine and have included activities such as phishing, reconnaissance, and attempts to compromise public information sources.
A blue background with white circles and red dots
Special Reports

Cyber Resilience

Learn five fundamental steps to enhance your organizations cyber resilience and help protect against ransomware and other malicious cyberattacks.
Abstract graphic of concentric circles in green, yellow, and white on a gray background.
Woman reading a book on a leather sofa in a cozy living room setting.
Get started

Join Microsoft events

Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
A woman reading from a tablet while standing outside a building.
Talk to us

Join Microsoft’s tech community

Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.

Follow Microsoft