Welcome to the interactive Microsoft Security Intelligence Report. We created this site as a complement to our annual report to enable you to dig into the data in more detail.
Some key highlighted takeaways may differ from the written report as we add new data monthly. Come back and visit often to check in on the latest security trends.
For a deeper assessment and recommendations on how to protect against threats, download the Microsoft Security Intelligence Report at www.microsoft.com/sir.
In a cloud weaponization threat scenario, an attacker establishes a foothold within a cloud infrastructure by compromising and taking control of one or more virtual machines.
Once compromised, those resources often communicate with command-and-control (C&C) servers to receive instructions. The geographical map shows outgoing communications to malicious IP addresses detected by Azure Security Center.