United States Change All Microsoft Sites


Current Edition

SIR Volume 21: January through June 2016

Key Findings
A summary of the analysis and conclusions for SIR volume 21.

Regional Threat Assessment
Deep dive telemetry by location for over 100 locations.

Featured Articles

Previous Editions

Protecting cloud infrastructure: Detecting and mitigating threats using Azure Security Center
This article details common threats that organizations may encounter as they move workloads to cloud-based services.

PROMETHIUM and NEODYMIUM: Parallel zero-day attacks targeting individuals in Europe
This article chronicles two activity groups code-named PROMETHIUM and NEODYMIUM, both of which target individuals in a specific area of Europe.

Protecting identities in the cloud: Mitigating password attacks
This article focuses on some of the things Microsoft does to prevent account compromise, even in cases where attackers have possession of valid account credentials.

Targeted attacks in South and Southeast Asia
This article profiles some of the tactics and techniques that one targeted attack group has been using to attack its targets.

A profile of a persistent and motivated adversary
This article profiles some of the tactics and techniques that one targeted attack group has been using to attack its targets.

The life and times of an exploit
This article illustrates how attackers can move quickly to take advantage of newly disclosed vulnerabilities even after they’ve been addressed with security updates, and demonstrates how swiftly testing and applying updates as they are released remains one of the best ways individuals and organizations can protect themselves from attack.

Exploitation Trends
Microsoft is committed to helping customers assess the risk they face from vulnerabilities. This article examines exploits that have been discovered, the vulnerabilities they targeted, and guidance on how to stay ahead of exploits.

Cloud Security: Conflict and Cooperation
Microsoft cloud services administrators and security response teams face similar or identical in nature issues faced by every IT administrator. This article examines two high-profile attack vectors from the perspective of Microsoft cloud services and incident response teams.

Measuring Benefits of Real-Time Security Software
This article illustrates how installing real-time security software from a reputable vendor and keeping it up to date is one of the most important steps to reduce exposure to malware.

Deceptive Downloads: Software, Music, and Movies
Provides information of how attackers take advantage of unsecure supply chains to distribute malware to victims around the world.

How Conficker Continues to Propagate
Provides information on why Conficker is a serious threat and what organizations can do to protect themselves.

Determined Adversaries and Targeted Attacks
Delivers insight into advanced persistent threats (APT) against organizations, governments, and individuals.

The Evolution of Malware and the Threat Landscape
This special edition of the SIR provides summarized information about how malware has evolved over the last 10 years.

TeliaSonera Case Study
European telecom company uses Microsoft security data to remove Botnet devices from its network.

Zeroing In on Malware Propagation Methods
This featured article for volume 11 covers classifying malware methods, user interaction insights, and provides analysis details.

SIR Volume 20: July - December 2015

Volume 19: January - June 2015

Volume 18: July - December 2014

Volume 17: January – June 2014

Volume 16: July – December 2013

Volume 15: January - June 2013

Volume 14: July - December 2012

Volume 13: January - June 2012

Volume 12: July - December 2011

Volume 11: January - June 2011

Volume 10: January - December 2010

Volume 9: January - June 2010

Volume 8: July - December 2009

Volume 7: January - June 2009

Volume 6: July - December 2008

Volume 5: January - June 2008