Cyberthreats, viruses, and malware - Microsoft Security Intelligence (original) (raw)

Threat trends

A hill with cogs and other parts of a machine in the background

Ransomware

Discover what makes ransomware one of the most prevalent threats

Chart showing three types of fileless threats

Identity-based attacks

Learn about the different techniques threat actors are using to attack identities and gain access to resources

Windows Defender ATP shown with several icons representing its security capabilities

Business email compromise (BEC)

Identify BEC attacks and learn how to protect organizations from this threat

Threat actor updates

A hill with cogs and other parts of a machine in the background

Nation-state threat actors

Nation-state threat actors launch cyber operations that are often focused on collecting data on their targets

Chart showing three types of fileless threats

Financially motivated threat actors

Cybercriminals continue to enhance their tools and techniques to maximize the impact of their campaigns, including ransomware and identity theft

Windows Defender ATP shown with several icons representing its security capabilities

Nation-state influence operations

Nation-states launch influence operations to sway public perception and sentiment, sow discord, and undermine trust in public institutions

Industrial operator with computing devices that can be affected by malware

Threat actor spotlight: Sleet actors

Learn about the latest activity associated with North Korean threat actors

Security Operations Center personnel responding to security incidents

Microsoft threat actor naming taxonomy

Learn about how Microsoft names threat actors

Aerial shot of Chicago showing buildings that represent businesses that should be protected

Threat actors using AI

Learn about emerging threats in the age of AI, focusing on identified activity associated with known threat actors