CINXE.COM
Digital Security Research | Microsoft Security Blog
<!DOCTYPE html> <html lang="en-US" dir="ltr" class="no-js"> <head> <meta charset="UTF-8" /> <meta name="viewport" content="width=device-width, initial-scale=1" /> <script>(function(html){html.className = html.className.replace(/\bno-js\b/,'js')})(document.documentElement);</script> <script>(function(html){html.className = html.className.replace(/\bno-js\b/,'js')})(document.documentElement);</script> <link rel="shortcut icon" href="https://c.s-microsoft.com/favicon.ico?v2" type="image/x-icon" /> <link rel="dns-prefetch" href="//target.microsoft.com"> <link rel="dns-prefetch" href="//microsoftmscompoc.tt.omtrdc.net"> <link rel="preload" href="https://wcpstatic.microsoft.com/mscc/lib/v2/wcp-consent.js" as="script"> <link rel="preload" href="https://www.microsoft.com/en-us/security/blog/wp-content/plugins/microsoft-metrics/assets/js/at.2.9.0.js" as="script"> <meta name="awa-pageType" content="Content type: Research"> <meta name="awa-market" content="en-us"> <meta name="awa-env" content="Production"> <meta name="awa-pgidx" content="1"> <meta name="awa-pgtot" content="29"> <meta name='robots' content='index, max-image-preview:large' /> <script> // Define Adobe Target Property var at_property = "beedee45-3f39-f022-9e83-653d86f7267c"; // Workspace Name ! function () { window.tt_getCookie = function (t) { var e = RegExp(t + "[^;]+").exec(document.cookie); return decodeURIComponent(e ? e.toString().replace(/^[^=]+./, "") : "") } var t = tt_getCookie("MC1"), e = tt_getCookie("MSFPC"); function o(t) { return t.split("=")[1].slice(0, 32) } var n = ""; if ("" != t) n = o(t); else if ("" != e) n = o(e); if (n.length > 0) var r = n; if (n.length > 0 && at_property != "") { window.targetPageParams = function () { return { "mbox3rdPartyId": r, "at_property": at_property } } } else if (at_property != "") { window.targetPageParams = function () { return { "at_property": at_property } } } }(); // ContentSquare functions function isEmpty(val) { return (val === undefined || val == null || val.length <= 0) ? true : false; } function key(obj) { return Object.keys(obj) .map(function(k) { return k + "" + obj[k]; }) .join(""); } function distinct(arr) { var result = arr.reduce(function(acc, e) { acc[key(e)] = e; return acc;}, {}); return Object.keys(result) .map(function(k) { return result[k]; }); } // Adobe Analytics data collection / ContentSquare ttMeta Object **DO NOT ALTER** var tnt_response = ""; document.addEventListener("at-request-succeeded", function (e) { if (e.detail.analyticsDetails != undefined) { /*** 1DS ***/ window.check1DS = function (j) { // function to check either 1DS or JSLL if ( (typeof analytics !== 'undefined') && typeof analytics.isInitialized === 'function' && analytics.isInitialized()) { // Check for 1DS tnt_response = e.detail; //ContentUpdate Event with Target Friendly names if (e.detail.responseTokens != undefined) { //checks for friendly name data from response tokens console.log("1DS - present with response tokens"); //ContentUpdate Event with tnta analytics.captureContentUpdate( { actionType: "A", behavior: "12", content: JSON.stringify({}), pageTags: { tnta: (tnt_response && tnt_response.analyticsDetails[0] ? tnt_response.analyticsDetails[0].payload.tnta : ''), //a4t data payload } } ) var tt_activityCount = e.detail.responseTokens.length; for (i = 0; i < tt_activityCount; i++) { //1DS Content Update console.log('1DS - started captureContentCall - i=' + i); analytics.captureContentUpdate( { actionType: "A", behavior: "12", content: JSON.stringify({}), pageTags: { tnta: '', // null out tnta to prevent duplicate A4T hits at_activity_name: (tnt_response && tnt_response.responseTokens[i] ? tnt_response.responseTokens[i]["activity.name"] : ''), //friendly name target activity at_exp_name: (tnt_response && tnt_response.responseTokens[i] ? tnt_response.responseTokens[i]["experience.name"] : ''), // friendly name target experience at_activity_id: (tnt_response && tnt_response.responseTokens[i] ? tnt_response.responseTokens[i]["activity.id"] : ''), at_exp_id: (tnt_response && tnt_response.responseTokens[i] ? tnt_response.responseTokens[i]["experience.id"] : '') } } ) } console.log('1DS - completed captureContentCall'); // ttMETA object set for ContentSquare pickup window.ttMETA = typeof(window.ttMETA) != "undefined" ? window.ttMETA : []; var tokens = e.detail.responseTokens; if (isEmpty(tokens)) { return; } var uniqueTokens = distinct(tokens); uniqueTokens.forEach(function(token) { window.ttMETA.push({ 'CampaignName': token["activity.name"], 'CampaignId': token["activity.id"], 'RecipeName': token["experience.name"], 'RecipeId': token["experience.id"], 'OfferId': token["option.id"], 'OfferName': token["option.name"] }); }); } else { console.log("1DS - present, no response tokens"); } } else { console.log('1DS - looping 1DS check'); if(j < 40) { j++; setTimeout(function(){check1DS(j)}, 250); console.log('1DS - looping 1DS check - loop j=' + j); } } }; check1DS(1); /*** /1DS ***/ } }); </script> <script> function adobeTargetTracking() { var s = document.createElement( 'script' ); var src = "https://www.microsoft.com/en-us/security/blog/wp-content/plugins/microsoft-metrics/assets/js/at.2.9.0.js"; s.setAttribute( 'src', src ); document.body.appendChild( s ); } </script> <!-- Adobe Target --> <!-- This site is optimized with the Yoast SEO plugin v23.9 - https://yoast.com/wordpress/plugins/seo/ --> <title>Digital Security Research | Microsoft Security Blog</title> <meta name="description" content="Microsoft Security Blog highlights the latest Research to keep you in-the-know on what's happening in digital security and threat intelligence." /> <link rel="canonical" href="https://www.microsoft.com/en-us/security/blog/content-type/research/" /> <link rel="next" href="https://www.microsoft.com/en-us/security/blog/content-type/research/page/2/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="Digital Security Research | Microsoft Security Blog" /> <meta property="og:description" content="Microsoft Security Blog highlights the latest Research to keep you in-the-know on what's happening in digital security and threat intelligence." /> <meta property="og:url" content="https://www.microsoft.com/en-us/security/blog/content-type/research/" /> <meta property="og:site_name" content="Microsoft Security Blog" /> <meta property="og:image" content="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2018/08/cropped-microsoft_logo_element.png" /> <meta property="og:image:width" content="512" /> <meta property="og:image:height" content="512" /> <meta property="og:image:type" content="image/png" /> <meta name="twitter:card" content="summary_large_image" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"CollectionPage","@id":"https://www.microsoft.com/en-us/security/blog/content-type/research/","url":"https://www.microsoft.com/en-us/security/blog/content-type/research/","name":"Digital Security Research | Microsoft Security Blog","isPartOf":{"@id":"https://www.microsoft.com/en-us/security/blog/#website"},"primaryImageOfPage":{"@id":"https://www.microsoft.com/en-us/security/blog/content-type/research/#primaryimage"},"image":{"@id":"https://www.microsoft.com/en-us/security/blog/content-type/research/#primaryimage"},"thumbnailUrl":"https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Microsoft-at-CYBERWARCON-2024.webp","description":"Microsoft Security Blog highlights the latest Research to keep you in-the-know on what's happening in digital security and threat intelligence.","breadcrumb":{"@id":"https://www.microsoft.com/en-us/security/blog/content-type/research/#breadcrumb"},"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.microsoft.com/en-us/security/blog/content-type/research/#primaryimage","url":"https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Microsoft-at-CYBERWARCON-2024.webp","contentUrl":"https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Microsoft-at-CYBERWARCON-2024.webp","width":1200,"height":801,"caption":"Photo of business professionals in foyer walking, chatting, holding deivces"},{"@type":"BreadcrumbList","@id":"https://www.microsoft.com/en-us/security/blog/content-type/research/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.microsoft.com/en-us/security/blog/"},{"@type":"ListItem","position":2,"name":"Research"}]},{"@type":"WebSite","@id":"https://www.microsoft.com/en-us/security/blog/#website","url":"https://www.microsoft.com/en-us/security/blog/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https://www.microsoft.com/en-us/security/blog/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://www.microsoft.com/en-us/security/blog/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://www.microsoft.com/en-us/security/blog/#organization","name":"Microsoft Security Blog","url":"https://www.microsoft.com/en-us/security/blog/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.microsoft.com/en-us/security/blog/#/schema/logo/image/","url":"https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2018/08/cropped-cropped-microsoft_logo_element.png","contentUrl":"https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2018/08/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https://www.microsoft.com/en-us/security/blog/#/schema/logo/image/"}}]}</script> <!-- / Yoast SEO plugin. --> <link rel='dns-prefetch' href='//wcpstatic.microsoft.com' /> <link rel='dns-prefetch' href='//www.microsoft.com' /> <link rel='dns-prefetch' href='//js.monitor.azure.com' /> <link rel="alternate" type="application/rss+xml" title="Microsoft Security Blog » Feed" href="https://www.microsoft.com/en-us/security/blog/feed/" /> <link rel="alternate" type="application/rss+xml" title="Microsoft Security Blog » Comments Feed" href="https://www.microsoft.com/en-us/security/blog/comments/feed/" /> <link rel="alternate" type="application/rss+xml" title="Microsoft Security Blog » Research Content type Feed" href="https://www.microsoft.com/en-us/security/blog/content-type/research/feed/" /> <link rel='stylesheet' id='wp-block-library-css' href='https://www.microsoft.com/en-us/security/blog/wp-includes/css/dist/block-library/style.min.css?ver=6.6.2' type='text/css' media='all' /> <style id='co-authors-plus-coauthors-style-inline-css' type='text/css'> .wp-block-co-authors-plus-coauthors.is-layout-flow [class*=wp-block-co-authors-plus]{display:inline} </style> <style id='co-authors-plus-avatar-style-inline-css' type='text/css'> .wp-block-co-authors-plus-avatar :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-avatar :where(img){vertical-align:middle}.wp-block-co-authors-plus-avatar:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-avatar.aligncenter{display:table;margin-inline:auto} </style> <style id='co-authors-plus-image-style-inline-css' type='text/css'> .wp-block-co-authors-plus-image{margin-bottom:0}.wp-block-co-authors-plus-image :where(img){height:auto;max-width:100%;vertical-align:bottom}.wp-block-co-authors-plus-coauthors.is-layout-flow .wp-block-co-authors-plus-image :where(img){vertical-align:middle}.wp-block-co-authors-plus-image:is(.alignfull,.alignwide) :where(img){width:100%}.wp-block-co-authors-plus-image:is(.alignleft,.alignright){display:table}.wp-block-co-authors-plus-image.aligncenter{display:table;margin-inline:auto} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}.wp-block-msxcm-cta-block{--wp--preset--color--material-color-brand-dark: #243a5e;--wp--preset--color--material-color-dark-bg-green: #107c10;--wp--preset--color--material-color-dark-bg-dark-orange: #6B2929;}:root { --wp--style--global--content-size: 724px;--wp--style--global--wide-size: 1414px; }:where(body) { margin: 0; }.wp-site-blocks > .alignleft { float: left; margin-right: 2em; }.wp-site-blocks > .alignright { float: right; margin-left: 2em; }.wp-site-blocks > .aligncenter { justify-content: center; margin-left: auto; margin-right: auto; }:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}.is-layout-flow > .alignleft{float: left;margin-inline-start: 0;margin-inline-end: 2em;}.is-layout-flow > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}.is-layout-flow > .aligncenter{margin-left: auto !important;margin-right: auto !important;}.is-layout-constrained > .alignleft{float: left;margin-inline-start: 0;margin-inline-end: 2em;}.is-layout-constrained > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}.is-layout-constrained > .aligncenter{margin-left: auto !important;margin-right: auto !important;}.is-layout-constrained > :where(:not(.alignleft):not(.alignright):not(.alignfull)){max-width: var(--wp--style--global--content-size);margin-left: auto !important;margin-right: auto !important;}.is-layout-constrained > .alignwide{max-width: var(--wp--style--global--wide-size);}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}body{padding-top: 0px;padding-right: 0px;padding-bottom: 0px;padding-left: 0px;}a:where(:not(.wp-element-button)){text-decoration: underline;}:root :where(.wp-element-button, .wp-block-button__link){background-color: #32373c;border-width: 0;color: #fff;font-family: inherit;font-size: inherit;line-height: inherit;padding: calc(0.667em + 2px) calc(1.333em + 2px);text-decoration: none;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;}.wp-block-msxcm-cta-block.has-material-color-brand-dark-color{color: var(--wp--preset--color--material-color-brand-dark) !important;}.wp-block-msxcm-cta-block.has-material-color-dark-bg-green-color{color: var(--wp--preset--color--material-color-dark-bg-green) !important;}.wp-block-msxcm-cta-block.has-material-color-dark-bg-dark-orange-color{color: var(--wp--preset--color--material-color-dark-bg-dark-orange) !important;}.wp-block-msxcm-cta-block.has-material-color-brand-dark-background-color{background-color: var(--wp--preset--color--material-color-brand-dark) !important;}.wp-block-msxcm-cta-block.has-material-color-dark-bg-green-background-color{background-color: var(--wp--preset--color--material-color-dark-bg-green) !important;}.wp-block-msxcm-cta-block.has-material-color-dark-bg-dark-orange-background-color{background-color: var(--wp--preset--color--material-color-dark-bg-dark-orange) !important;}.wp-block-msxcm-cta-block.has-material-color-brand-dark-border-color{border-color: var(--wp--preset--color--material-color-brand-dark) !important;}.wp-block-msxcm-cta-block.has-material-color-dark-bg-green-border-color{border-color: var(--wp--preset--color--material-color-dark-bg-green) !important;}.wp-block-msxcm-cta-block.has-material-color-dark-bg-dark-orange-border-color{border-color: var(--wp--preset--color--material-color-dark-bg-dark-orange) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='ms_search_styles-css' href='https://www.microsoft.com/en-us/security/blog/wp-content/plugins/microsoft-faceted-search/dist/css/frontend.css?ver=1732562250' type='text/css' media='all' /> <link rel='stylesheet' id='mse-moray-styles-css' href='https://www.microsoft.com/en-us/security/blog/wp-content/themes/security-blog/dist/css/moray-style.css?ver=344c995a9fc78f946e50' type='text/css' media='all' /> <link rel='stylesheet' id='styles-css' href='https://www.microsoft.com/en-us/security/blog/wp-content/themes/security-blog/dist/css/frontend.css?ver=1b4d96d0f0d4585f3c62' type='text/css' media='all' /> <link rel='stylesheet' id='msx-theme-toggle-css' href='https://www.microsoft.com/en-us/security/blog/wp-content/themes/xtheme/dist/css/theme-toggle.css?ver=1732562319' type='text/css' media='all' /> <link rel='stylesheet' id='msx-theme-uhf-css' href='https://www.microsoft.com/en-us/security/blog/wp-content/themes/xtheme/dist/css/uhf.css?ver=1732562319' type='text/css' media='all' /> <link rel='stylesheet' id='frontend-styles-css' href='https://www.microsoft.com/en-us/security/blog/wp-content/themes/xtheme/dist/css/frontend-styles.css?ver=1732562319' type='text/css' media='all' /> <link rel='stylesheet' id='fluent-icons-css' href='https://www.microsoft.com/en-us/security/blog/wp-content/themes/xtheme/dist/css/fluent-icons.css?ver=1732562319' type='text/css' media='all' /> <link rel='stylesheet' id='msxcm-styles-css' href='https://www.microsoft.com/en-us/security/blog/wp-content/plugins/cloud-marketing-modules/dist/css/frontend.css?ver=1732562297' type='text/css' media='all' /> <link rel='stylesheet' id='microsoft-uhf-css' href='https://www.microsoft.com/en-us/security/blog/wp-content/plugins/microsoft-uhf/assets/rss.css?ver=0.5.3' type='text/css' media='all' /> <script type="text/javascript" src="https://wcpstatic.microsoft.com/mscc/lib/v2/wcp-consent.js" id="wcp-consent-js"></script> <script type="text/javascript" src="https://js.monitor.azure.com/scripts/c/ms.analytics-web-3.min.js" id="oneds-tracking-js"></script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <link rel="https://api.w.org/" href="https://www.microsoft.com/en-us/security/blog/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.microsoft.com/en-us/security/blog/wp-json/wp/v2/content-type/3663" /> <!-- Comscore Code --> <script> function comscoreTag() { const s = document.createElement( 'script' ); const src = 'https://www.microsoft.com/library/svy/broker.js'; s.setAttribute( 'src', src ); s.setAttribute('async', 'true'); document.head.appendChild( s ); } </script> <!-- End Comscore Code --> <link rel="stylesheet" href="https://www.microsoft.com/onerfstatics/marketingsites-eus-prod/west-european/shell/_scrf/css/themes=default.device=uplevel_web_pc/1b-9d8ed9/c9-be0100/a6-e969ef/43-9f2e7c/82-8b5456/a0-5d3913/43-5a5ab8/ca-ae3ce4?ver=2.0&_cf=02242021_3231" type="text/css" media="all" /><!-- Stream WordPress user activity plugin v4.0.2 --> <link rel='manifest' href='https://www.microsoft.com/en-us/security/blog/wp-content/themes/security-blog/manifest.json' /><style type="text/css">.recentcomments a{display:inline !important;padding:0 !important;margin:0 !important;}</style> <!-- Facebook Pixel Code --> <script> function facebookTracking() { !function(f,b,e,v,n,t,s){if(f.fbq)return;n=f.fbq=function(){n.callMethod? n.callMethod.apply(n,arguments):n.queue.push(arguments)};if(!f._fbq)f._fbq=n; n.push=n;n.loaded=!0;n.version='2.0';n.queue=[];t=b.createElement(e);t.async=!0; t.src=v;t.type='ms-delay-type';t.setAttribute('data-ms-type','text/javascript'); s=b.getElementsByTagName(e)[0];s.parentNode.insertBefore(t,s)}(window, document,'script','https://connect.facebook.net/en_US/fbevents.js'); fbq('init', '1770559986549030'); fbq('track', 'PageView'); } </script> <!-- End Facebook Pixel Code --> <!-- LinkedIn Code --> <script type="text/javascript"> var _linkedin_data_partner_id = "7850"; function linkedinTracking(){ var s = document.getElementsByTagName("script")[0]; var b = document.createElement("script"); b.type = "text/javascript";b.async = true; b.src = "https://snap.licdn.com/li.lms-analytics/insight.min.js"; s.parentNode.insertBefore(b, s); } </script> <!-- End LinkedIn Code --> <!-- Google DoubleClick Code --> <script> function doubleclickTracking() { var random = Math.floor(Math.random() * 10000000000); var img = document.createElement('img'); img.src = 'https://googleads.g.doubleclick.net/pagead/viewthroughconversion/862646735/?guid=ON&script=0&random=' + random; img.width = 1; img.height = 1; img.style = 'display:none;'; document.body.appendChild(img); } </script> <!-- End Google DoubleClick Code --> <!-- Microsoft Advertising UET Code --> <script> function microsoftAds() { (function(w, d, t, r, u) { var f, n, i; w[u] = w[u] || [], f = function() { var o = { ti: "4000034" }; o.q = w[u], w[u] = new UET(o), w[u].push("pageLoad") }, n = d.createElement(t), n.src = r, n.async = 1, n.onload = n.onreadystatechange = function() { var s = this.readyState; s && s !== "loaded" && s !== "complete" || (f(), n.onload = n.onreadystatechange = null) }, i = d.getElementsByTagName(t)[0], i.parentNode.insertBefore(n, i) })(window, document, "script", "//bat.bing.com/bat.js", "uetq"); } </script> <!-- End Microsoft Advertising UET Code --> <!-- Clarity Code --> <script type="text/javascript"> function clarityTracking() { (function(c,l,a,r,i,t,y){ c[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)}; t=l.createElement(r);t.async=1;t.src="https://www.clarity.ms/tag/"+i; t.type='ms-delay-type';t.setAttribute('data-ms-type','text/javascript'); y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y); })(window, document, "clarity", "script", "coq1z7el3n"); } </script> <!-- End Clarity Code --> <style type="text/css" id="wp-custom-css"> body.term-threat-intelligence .faceted-search-results__items > div:has(> div.promo-banner) { display: none; } </style> <script src="https://www.microsoft.com/onerfstatics/marketingsites-eus-prod/shell/_scrf/js/themes=default/54-af9f9f/d4-fb1f57/e1-a50eee/e7-954872/d8-97d509/f0-251fe2/46-be1318/77-04a268/11-240c7b/63-077520/a4-34de62/f9-a5b2ce/db-bc0148/dc-7e9864/6d-c07ea1/6f-dafe8c/f6-aa5278/73-a24d00/6d-1e7ed0/b7-cadaa7/c4-898cf2/ca-40b7b0/4e-ee3a55/3e-f5c39b/c3-6454d7/f9-7592d3/d0-e64f3e/92-10345d/79-499886/7e-cda2d3/58-ab4971/ca-108466/e0-3c9860/de-884374/1f-100dea/33-abe4df/2b-8e0ae6?ver=2.0&_cf=02242021_3231&iife=1"></script> </head> <body class="archive tax-content-type term-research term-3663 microsoft-uhf"> <div id="ms-cookie-banner"></div> <div id="headerArea" class="uhf" data-m='{"cN":"headerArea","cT":"Area_coreuiArea","id":"a1Body","sN":1,"aN":"Body"}'> <div id="headerRegion" data-region-key="headerregion" data-m='{"cN":"headerRegion","cT":"Region_coreui-region","id":"r1a1","sN":1,"aN":"a1"}' > <div id="headerUniversalHeader" data-m='{"cN":"headerUniversalHeader","cT":"Module_coreui-universalheader","id":"m1r1a1","sN":1,"aN":"r1a1"}' data-module-id="Category|headerRegion|coreui-region|headerUniversalHeader|coreui-universalheader"> <a id="uhfSkipToMain" class="m-skip-to-main" href="javascript:void(0)" data-href="#mainContent" tabindex="0" data-m='{"cN":"Skip to content_nonnav","id":"nn1m1r1a1","sN":1,"aN":"m1r1a1"}'>Skip to main content</a> <header class="c-uhfh context-uhf no-js c-sgl-stck c-category-header " itemscope="itemscope" data-header-footprint="/MSSecurity/MSSecurityHeader, fromService: True" data-magict="true" itemtype="http://schema.org/Organization"> <div class="theme-light js-global-head f-closed global-head-cont" data-m='{"cN":"Universal Header_cont","cT":"Container","id":"c2m1r1a1","sN":2,"aN":"m1r1a1"}'> <div class="c-uhfh-gcontainer-st"> <button type="button" class="c-action-trigger c-glyph glyph-global-nav-button" aria-label="All Microsoft expand to see list of Microsoft products and services" initialState-label="All Microsoft expand to see list of Microsoft products and services" toggleState-label="Close All Microsoft list" aria-expanded="false" data-m='{"cN":"Mobile menu button_nonnav","id":"nn1c2m1r1a1","sN":1,"aN":"c2m1r1a1"}'></button> <button type="button" class="c-action-trigger c-glyph glyph-arrow-htmllegacy c-close-search" aria-label="Close search" aria-expanded="false" data-m='{"cN":"Close Search_nonnav","id":"nn2c2m1r1a1","sN":2,"aN":"c2m1r1a1"}'></button> <a id="uhfLogo" class="c-logo c-sgl-stk-uhfLogo" itemprop="url" href="https://www.microsoft.com" aria-label="Microsoft" data-m='{"cN":"GlobalNav_Logo_cont","cT":"Container","id":"c3c2m1r1a1","sN":3,"aN":"c2m1r1a1"}'> <img alt="" itemprop="logo" class="c-image" src="https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE1Mu3b?ver=5c31" role="presentation" aria-hidden="true" /> <span itemprop="name" role="presentation" aria-hidden="true">Microsoft</span> </a> <div class="f-mobile-title"> <button type="button" class="c-action-trigger c-glyph glyph-chevron-left" aria-label="See more menu options" data-m='{"cN":"Mobile back button_nonnav","id":"nn4c2m1r1a1","sN":4,"aN":"c2m1r1a1"}'></button> <span data-global-title="Microsoft home" class="js-mobile-title">Microsoft Security</span> <button type="button" class="c-action-trigger c-glyph glyph-chevron-right" aria-label="See more menu options" data-m='{"cN":"Mobile forward button_nonnav","id":"nn5c2m1r1a1","sN":5,"aN":"c2m1r1a1"}'></button> </div> <div class="c-show-pipe x-hidden-vp-mobile-st"> <a id="uhfCatLogo" class="c-logo c-cat-logo" href="https://www.microsoft.com/en-us/security" aria-label="Microsoft Security" itemprop="url" data-m='{"cN":"CatNav_Microsoft Security_nav","id":"n6c2m1r1a1","sN":6,"aN":"c2m1r1a1"}'> <span>Microsoft Security</span> </a> </div> <div class="cat-logo-button-cont x-hidden"> <button type="button" id="uhfCatLogoButton" class="c-cat-logo-button x-hidden" aria-expanded="false" aria-label="Microsoft Security" data-m='{"cN":"Microsoft Security_nonnav","id":"nn7c2m1r1a1","sN":7,"aN":"c2m1r1a1"}'> Microsoft Security </button> </div> <nav id="uhf-g-nav" aria-label="Contextual menu" class="c-uhfh-gnav" data-m='{"cN":"Category nav_cont","cT":"Container","id":"c8c2m1r1a1","sN":8,"aN":"c2m1r1a1"}'> <ul class="js-paddle-items"> <li class="single-link js-nav-menu x-hidden-none-mobile-vp uhf-menu-item"> <a class="c-uhf-nav-link" href="https://www.microsoft.com/en-us/security" data-m='{"cN":"CatNav_Home_nav","id":"n1c8c2m1r1a1","sN":1,"aN":"c8c2m1r1a1"}' > Home </a> </li> <li class="nested-menu uhf-menu-item"> <div class="c-uhf-menu js-nav-menu"> <button type="button" id="c-shellmenu_40" aria-expanded="false" data-m='{"id":"nn2c8c2m1r1a1","sN":2,"aN":"c8c2m1r1a1"}'>Solutions</button> <ul class="" data-class-idn="" aria-hidden="true" data-m='{"cT":"Container","id":"c3c8c2m1r1a1","sN":3,"aN":"c8c2m1r1a1"}'> <li class="js-nav-menu single-link" data-m='{"cN":"Solutions_AI_cont","cT":"Container","id":"c1c3c8c2m1r1a1","sN":1,"aN":"c3c8c2m1r1a1"}'> <a id="c-shellmenu_41" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/solutions/generative-ai-cybersecurity" data-m='{"cN":"CatNav_Solutions_AI_nav","id":"n1c1c3c8c2m1r1a1","sN":1,"aN":"c1c3c8c2m1r1a1"}'>AI-powered cybersecurity</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Solutions_CloudSecurity_cont","cT":"Container","id":"c2c3c8c2m1r1a1","sN":2,"aN":"c3c8c2m1r1a1"}'> <a id="c-shellmenu_42" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/solutions/cloud-security" data-m='{"cN":"CatNav_Solutions_CloudSecurity_nav","id":"n1c2c3c8c2m1r1a1","sN":1,"aN":"c2c3c8c2m1r1a1"}'>Cloud security</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c3c3c8c2m1r1a1","sN":3,"aN":"c3c8c2m1r1a1"}'> <a id="c-shellmenu_43" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/solutions/data-security" data-m='{"id":"n1c3c3c8c2m1r1a1","sN":1,"aN":"c3c3c8c2m1r1a1"}'>Data security</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Solutions_IdentityAccess_cont","cT":"Container","id":"c4c3c8c2m1r1a1","sN":4,"aN":"c3c8c2m1r1a1"}'> <a id="c-shellmenu_44" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/solutions/identity-access" data-m='{"cN":"CatNav_Solutions_IdentityAccess_nav","id":"n1c4c3c8c2m1r1a1","sN":1,"aN":"c4c3c8c2m1r1a1"}'>Identity & network access</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c5c3c8c2m1r1a1","sN":5,"aN":"c3c8c2m1r1a1"}'> <a id="c-shellmenu_45" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/solutions/privacy-risk-management" data-m='{"id":"n1c5c3c8c2m1r1a1","sN":1,"aN":"c5c3c8c2m1r1a1"}'>Privacy & risk management</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Solutions_SecureAI_cont","cT":"Container","id":"c6c3c8c2m1r1a1","sN":6,"aN":"c3c8c2m1r1a1"}'> <a id="c-shellmenu_46" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/solutions/security-for-ai " data-m='{"cN":"CatNav_Solutions_SecureAI_nav","id":"n1c6c3c8c2m1r1a1","sN":1,"aN":"c6c3c8c2m1r1a1"}'>Security for AI</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c7c3c8c2m1r1a1","sN":7,"aN":"c3c8c2m1r1a1"}'> <a id="c-shellmenu_47" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/solutions/ai-powered-unified-secops-platform" data-m='{"id":"n1c7c3c8c2m1r1a1","sN":1,"aN":"c7c3c8c2m1r1a1"}'>Unified SecOps</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c8c3c8c2m1r1a1","sN":8,"aN":"c3c8c2m1r1a1"}'> <a id="c-shellmenu_48" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/zero-trust" data-m='{"id":"n1c8c3c8c2m1r1a1","sN":1,"aN":"c8c3c8c2m1r1a1"}'>Zero Trust</a> </li> </ul> </div> </li> <li class="nested-menu uhf-menu-item"> <div class="c-uhf-menu js-nav-menu"> <button type="button" id="c-shellmenu_49" aria-expanded="false" data-m='{"id":"nn4c8c2m1r1a1","sN":4,"aN":"c8c2m1r1a1"}'>Products</button> <ul class="f-multi-column f-multi-column-6" data-class-idn="f-multi-column f-multi-column-6" aria-hidden="true" data-m='{"cT":"Container","id":"c5c8c2m1r1a1","sN":5,"aN":"c8c2m1r1a1"}'> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c1c5c8c2m1r1a1","sN":1,"aN":"c5c8c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_50-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c1c5c8c2m1r1a1","sN":1,"aN":"c1c5c8c2m1r1a1"}'>Product families</span> <button id="uhf-navbtn-shellmenu_50-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c1c5c8c2m1r1a1","sN":2,"aN":"c1c5c8c2m1r1a1"}'>Product families</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_50-span"> <li class="js-nav-menu single-link" data-m='{"cN":"Products_DefenderFamily_cont","cT":"Container","id":"c3c1c5c8c2m1r1a1","sN":3,"aN":"c1c5c8c2m1r1a1"}'> <a id="shellmenu_51" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/microsoft-defender" data-m='{"cN":"CatNav_Products_DefenderFamily_nav","id":"n1c3c1c5c8c2m1r1a1","sN":1,"aN":"c3c1c5c8c2m1r1a1"}'>Microsoft Defender</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_EntraFamily_cont","cT":"Container","id":"c4c1c5c8c2m1r1a1","sN":4,"aN":"c1c5c8c2m1r1a1"}'> <a id="shellmenu_52" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/microsoft-entra" data-m='{"cN":"CatNav_Products_EntraFamily_nav","id":"n1c4c1c5c8c2m1r1a1","sN":1,"aN":"c4c1c5c8c2m1r1a1"}'>Microsoft Entra</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c5c1c5c8c2m1r1a1","sN":5,"aN":"c1c5c8c2m1r1a1"}'> <a id="shellmenu_53" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/microsoft-Intune" data-m='{"id":"n1c5c1c5c8c2m1r1a1","sN":1,"aN":"c5c1c5c8c2m1r1a1"}'>Microsoft Intune</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c6c1c5c8c2m1r1a1","sN":6,"aN":"c1c5c8c2m1r1a1"}'> <a id="shellmenu_54" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/microsoft-priva" data-m='{"id":"n1c6c1c5c8c2m1r1a1","sN":1,"aN":"c6c1c5c8c2m1r1a1"}'>Microsoft Priva</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_PurviewFamily_cont","cT":"Container","id":"c7c1c5c8c2m1r1a1","sN":7,"aN":"c1c5c8c2m1r1a1"}'> <a id="shellmenu_55" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/microsoft-purview" data-m='{"cN":"CatNav_Products_PurviewFamily_nav","id":"n1c7c1c5c8c2m1r1a1","sN":1,"aN":"c7c1c5c8c2m1r1a1"}'>Microsoft Purview</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c8c1c5c8c2m1r1a1","sN":8,"aN":"c1c5c8c2m1r1a1"}'> <a id="shellmenu_56" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-sentinel" data-m='{"id":"n1c8c1c5c8c2m1r1a1","sN":1,"aN":"c8c1c5c8c2m1r1a1"}'>Microsoft Sentinel</a> </li> </ul> </li> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c2c5c8c2m1r1a1","sN":2,"aN":"c5c8c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_57-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c2c5c8c2m1r1a1","sN":1,"aN":"c2c5c8c2m1r1a1"}'>Security AI</span> <button id="uhf-navbtn-shellmenu_57-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c2c5c8c2m1r1a1","sN":2,"aN":"c2c5c8c2m1r1a1"}'>Security AI</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_57-span"> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c3c2c5c8c2m1r1a1","sN":3,"aN":"c2c5c8c2m1r1a1"}'> <a id="shellmenu_58" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot" data-m='{"id":"n1c3c2c5c8c2m1r1a1","sN":1,"aN":"c3c2c5c8c2m1r1a1"}'>Microsoft Security Copilot</a> </li> </ul> </li> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c3c5c8c2m1r1a1","sN":3,"aN":"c5c8c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_59-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c3c5c8c2m1r1a1","sN":1,"aN":"c3c5c8c2m1r1a1"}'>Identity & access</span> <button id="uhf-navbtn-shellmenu_59-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c3c5c8c2m1r1a1","sN":2,"aN":"c3c5c8c2m1r1a1"}'>Identity & access</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_59-span"> <li class="js-nav-menu single-link" data-m='{"cN":"Products_EntraID_cont","cT":"Container","id":"c3c3c5c8c2m1r1a1","sN":3,"aN":"c3c5c8c2m1r1a1"}'> <a id="shellmenu_60" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id" data-m='{"cN":"CatNav_Products_EntraID_nav","id":"n1c3c3c5c8c2m1r1a1","sN":1,"aN":"c3c3c5c8c2m1r1a1"}'>Microsoft Entra ID (Azure Active Directory)</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c4c3c5c8c2m1r1a1","sN":4,"aN":"c3c5c8c2m1r1a1"}'> <a id="shellmenu_61" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-external-id" data-m='{"id":"n1c4c3c5c8c2m1r1a1","sN":1,"aN":"c4c3c5c8c2m1r1a1"}'>Microsoft Entra External ID</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Microsoft Entra ID Governance_cont","cT":"Container","id":"c5c3c5c8c2m1r1a1","sN":5,"aN":"c3c5c8c2m1r1a1"}'> <a id="shellmenu_62" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id-governance" data-m='{"cN":"CatNav_Microsoft Entra ID Governance_nav","id":"n1c5c3c5c8c2m1r1a1","sN":1,"aN":"c5c3c5c8c2m1r1a1"}'>Microsoft Entra ID Governance</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_IDProtection_cont","cT":"Container","id":"c6c3c5c8c2m1r1a1","sN":6,"aN":"c3c5c8c2m1r1a1"}'> <a id="shellmenu_63" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id-protection " data-m='{"cN":"CatNav_Products_IDProtection_nav","id":"n1c6c3c5c8c2m1r1a1","sN":1,"aN":"c6c3c5c8c2m1r1a1"}'>Microsoft Entra ID Protection</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_InternetAccess_cont","cT":"Container","id":"c7c3c5c8c2m1r1a1","sN":7,"aN":"c3c5c8c2m1r1a1"}'> <a id="shellmenu_64" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-internet-access" data-m='{"cN":"CatNav_Products_InternetAccess_nav","id":"n1c7c3c5c8c2m1r1a1","sN":1,"aN":"c7c3c5c8c2m1r1a1"}'>Microsoft Entra Internet Access</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_PrivateAccess_cont","cT":"Container","id":"c8c3c5c8c2m1r1a1","sN":8,"aN":"c3c5c8c2m1r1a1"}'> <a id="shellmenu_65" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-private-access" data-m='{"cN":"CatNav_Products_PrivateAccess_nav","id":"n1c8c3c5c8c2m1r1a1","sN":1,"aN":"c8c3c5c8c2m1r1a1"}'>Microsoft Entra Private Access</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_PermissionsManagement_cont","cT":"Container","id":"c9c3c5c8c2m1r1a1","sN":9,"aN":"c3c5c8c2m1r1a1"}'> <a id="shellmenu_66" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-permissions-management " data-m='{"cN":"CatNav_Products_PermissionsManagement_nav","id":"n1c9c3c5c8c2m1r1a1","sN":1,"aN":"c9c3c5c8c2m1r1a1"}'>Microsoft Entra Permissions Management</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_VerifiedID_cont","cT":"Container","id":"c10c3c5c8c2m1r1a1","sN":10,"aN":"c3c5c8c2m1r1a1"}'> <a id="shellmenu_67" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-verified-id" data-m='{"cN":"CatNav_Products_VerifiedID_nav","id":"n1c10c3c5c8c2m1r1a1","sN":1,"aN":"c10c3c5c8c2m1r1a1"}'>Microsoft Entra Verified ID</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_WorkloadID_cont","cT":"Container","id":"c11c3c5c8c2m1r1a1","sN":11,"aN":"c3c5c8c2m1r1a1"}'> <a id="shellmenu_68" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-workload-id" data-m='{"cN":"CatNav_Products_WorkloadID_nav","id":"n1c11c3c5c8c2m1r1a1","sN":1,"aN":"c11c3c5c8c2m1r1a1"}'>Microsoft Entra Workload ID</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c12c3c5c8c2m1r1a1","sN":12,"aN":"c3c5c8c2m1r1a1"}'> <a id="shellmenu_69" class="js-subm-uhf-nav-link" href="https://azure.microsoft.com/en-us/products/microsoft-entra-ds" data-m='{"id":"n1c12c3c5c8c2m1r1a1","sN":1,"aN":"c12c3c5c8c2m1r1a1"}'>Microsoft Entra Domain Services</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_AzureKeyVault_cont","cT":"Container","id":"c13c3c5c8c2m1r1a1","sN":13,"aN":"c3c5c8c2m1r1a1"}'> <a id="shellmenu_70" class="js-subm-uhf-nav-link" href="https://azure.microsoft.com/en-us/products/key-vault/" data-m='{"cN":"CatNav_Products_AzureKeyVault_nav","id":"n1c13c3c5c8c2m1r1a1","sN":1,"aN":"c13c3c5c8c2m1r1a1"}'>Azure Key Vault</a> </li> </ul> </li> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c4c5c8c2m1r1a1","sN":4,"aN":"c5c8c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_71-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c4c5c8c2m1r1a1","sN":1,"aN":"c4c5c8c2m1r1a1"}'>SIEM & XDR</span> <button id="uhf-navbtn-shellmenu_71-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c4c5c8c2m1r1a1","sN":2,"aN":"c4c5c8c2m1r1a1"}'>SIEM & XDR</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_71-span"> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c3c4c5c8c2m1r1a1","sN":3,"aN":"c4c5c8c2m1r1a1"}'> <a id="shellmenu_72" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-sentinel" data-m='{"id":"n1c3c4c5c8c2m1r1a1","sN":1,"aN":"c3c4c5c8c2m1r1a1"}'>Microsoft Sentinel</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c4c4c5c8c2m1r1a1","sN":4,"aN":"c4c5c8c2m1r1a1"}'> <a id="shellmenu_73" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/cloud-security/microsoft-defender-cloud" data-m='{"id":"n1c4c4c5c8c2m1r1a1","sN":1,"aN":"c4c4c5c8c2m1r1a1"}'>Microsoft Defender for Cloud</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c5c4c5c8c2m1r1a1","sN":5,"aN":"c4c5c8c2m1r1a1"}'> <a id="shellmenu_74" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-xdr" data-m='{"id":"n1c5c4c5c8c2m1r1a1","sN":1,"aN":"c5c4c5c8c2m1r1a1"}'>Microsoft Defender XDR</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_DefenderEndpoint_cont","cT":"Container","id":"c6c4c5c8c2m1r1a1","sN":6,"aN":"c4c5c8c2m1r1a1"}'> <a id="shellmenu_75" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/endpoint-security/microsoft-defender-endpoint" data-m='{"cN":"CatNav_Products_DefenderEndpoint_nav","id":"n1c6c4c5c8c2m1r1a1","sN":1,"aN":"c6c4c5c8c2m1r1a1"}'>Microsoft Defender for Endpoint</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c7c4c5c8c2m1r1a1","sN":7,"aN":"c4c5c8c2m1r1a1"}'> <a id="shellmenu_76" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-office-365" data-m='{"id":"n1c7c4c5c8c2m1r1a1","sN":1,"aN":"c7c4c5c8c2m1r1a1"}'>Microsoft Defender for Office 365</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_DefenderIdentity_cont","cT":"Container","id":"c8c4c5c8c2m1r1a1","sN":8,"aN":"c4c5c8c2m1r1a1"}'> <a id="shellmenu_77" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-for-identity" data-m='{"cN":"CatNav_Products_DefenderIdentity_nav","id":"n1c8c4c5c8c2m1r1a1","sN":1,"aN":"c8c4c5c8c2m1r1a1"}'>Microsoft Defender for Identity</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c9c4c5c8c2m1r1a1","sN":9,"aN":"c4c5c8c2m1r1a1"}'> <a id="shellmenu_78" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-cloud-apps" data-m='{"id":"n1c9c4c5c8c2m1r1a1","sN":1,"aN":"c9c4c5c8c2m1r1a1"}'>Microsoft Defender for Cloud Apps</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Microsoft Security Exposure Management_cont","cT":"Container","id":"c10c4c5c8c2m1r1a1","sN":10,"aN":"c4c5c8c2m1r1a1"}'> <a id="shellmenu_79" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-security-exposure-management" data-m='{"cN":"CatNav_Microsoft Security Exposure Management_nav","id":"n1c10c4c5c8c2m1r1a1","sN":1,"aN":"c10c4c5c8c2m1r1a1"}'>Microsoft Security Exposure Management</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_DefenderVulnerability_cont","cT":"Container","id":"c11c4c5c8c2m1r1a1","sN":11,"aN":"c4c5c8c2m1r1a1"}'> <a id="shellmenu_80" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/threat-protection/microsoft-defender-vulnerability-management " data-m='{"cN":"CatNav_Products_DefenderVulnerability_nav","id":"n1c11c4c5c8c2m1r1a1","sN":1,"aN":"c11c4c5c8c2m1r1a1"}'>Microsoft Defender Vulnerability Management</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_DefenderTI_cont","cT":"Container","id":"c12c4c5c8c2m1r1a1","sN":12,"aN":"c4c5c8c2m1r1a1"}'> <a id="shellmenu_81" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-threat-intelligence" data-m='{"cN":"CatNav_Products_DefenderTI_nav","id":"n1c12c4c5c8c2m1r1a1","sN":1,"aN":"c12c4c5c8c2m1r1a1"}'>Microsoft Defender Threat Intelligence</a> </li> </ul> </li> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c5c5c8c2m1r1a1","sN":5,"aN":"c5c8c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_82-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c5c5c8c2m1r1a1","sN":1,"aN":"c5c5c8c2m1r1a1"}'>Cloud security</span> <button id="uhf-navbtn-shellmenu_82-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c5c5c8c2m1r1a1","sN":2,"aN":"c5c5c8c2m1r1a1"}'>Cloud security</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_82-span"> <li class="js-nav-menu single-link" data-m='{"cN":"Products_DefenderCloud_cont","cT":"Container","id":"c3c5c5c8c2m1r1a1","sN":3,"aN":"c5c5c8c2m1r1a1"}'> <a id="shellmenu_83" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/cloud-security/microsoft-defender-cloud" data-m='{"cN":"CatNav_Products_DefenderCloud_nav","id":"n1c3c5c5c8c2m1r1a1","sN":1,"aN":"c3c5c5c8c2m1r1a1"}'>Microsoft Defender for Cloud</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_DefenderCSPM_cont","cT":"Container","id":"c4c5c5c8c2m1r1a1","sN":4,"aN":"c5c5c8c2m1r1a1"}'> <a id="shellmenu_84" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/cloud-security/microsoft-defender-cloud-security-posture-management" data-m='{"cN":"CatNav_Products_DefenderCSPM_nav","id":"n1c4c5c5c8c2m1r1a1","sN":1,"aN":"c4c5c5c8c2m1r1a1"}'>Microsoft Defender Cloud Security Posture Mgmt</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_DefenderEASM_cont","cT":"Container","id":"c5c5c5c8c2m1r1a1","sN":5,"aN":"c5c5c8c2m1r1a1"}'> <a id="shellmenu_85" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/security/business/cloud-security/microsoft-defender-external-attack-surface-management" data-m='{"cN":"CatNav_Products_DefenderEASM_nav","id":"n1c5c5c5c8c2m1r1a1","sN":1,"aN":"c5c5c5c8c2m1r1a1"}'>Microsoft Defender External Attack Surface Management</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_AzureFirewall_cont","cT":"Container","id":"c6c5c5c8c2m1r1a1","sN":6,"aN":"c5c5c8c2m1r1a1"}'> <a id="shellmenu_86" class="js-subm-uhf-nav-link" href="https://azure.microsoft.com/en-us/services/azure-firewall/" data-m='{"cN":"CatNav_Products_AzureFirewall_nav","id":"n1c6c5c5c8c2m1r1a1","sN":1,"aN":"c6c5c5c8c2m1r1a1"}'>Azure Firewall</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_AzureWebAppFirewall_cont","cT":"Container","id":"c7c5c5c8c2m1r1a1","sN":7,"aN":"c5c5c8c2m1r1a1"}'> <a id="shellmenu_87" class="js-subm-uhf-nav-link" href="https://azure.microsoft.com/en-us/products/web-application-firewall/" data-m='{"cN":"CatNav_Products_AzureWebAppFirewall_nav","id":"n1c7c5c5c8c2m1r1a1","sN":1,"aN":"c7c5c5c8c2m1r1a1"}'>Azure Web App Firewall</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_AzureDDoSProtection_cont","cT":"Container","id":"c8c5c5c8c2m1r1a1","sN":8,"aN":"c5c5c8c2m1r1a1"}'> <a id="shellmenu_88" class="js-subm-uhf-nav-link" href="https://azure.microsoft.com/en-us/products/ddos-protection/" data-m='{"cN":"CatNav_Products_AzureDDoSProtection_nav","id":"n1c8c5c5c8c2m1r1a1","sN":1,"aN":"c8c5c5c8c2m1r1a1"}'>Azure DDoS Protection</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_GitHubAdvancedSecurty_cont","cT":"Container","id":"c9c5c5c8c2m1r1a1","sN":9,"aN":"c5c5c8c2m1r1a1"}'> <a id="shellmenu_89" class="js-subm-uhf-nav-link" href="https://github.com/features/security" data-m='{"cN":"CatNav_Products_GitHubAdvancedSecurty_nav","id":"n1c9c5c5c8c2m1r1a1","sN":1,"aN":"c9c5c5c8c2m1r1a1"}'>GitHub Advanced Security</a> </li> </ul> </li> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c6c5c8c2m1r1a1","sN":6,"aN":"c5c8c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_90-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c6c5c8c2m1r1a1","sN":1,"aN":"c6c5c8c2m1r1a1"}'>Endpoint security & management</span> <button id="uhf-navbtn-shellmenu_90-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c6c5c8c2m1r1a1","sN":2,"aN":"c6c5c8c2m1r1a1"}'>Endpoint security & management</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_90-span"> <li class="js-nav-menu single-link" data-m='{"cN":"Products_DefenderEndpoint_cont","cT":"Container","id":"c3c6c5c8c2m1r1a1","sN":3,"aN":"c6c5c8c2m1r1a1"}'> <a id="shellmenu_91" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/endpoint-security/microsoft-defender-endpoint" data-m='{"cN":"CatNav_Products_DefenderEndpoint_nav","id":"n1c3c6c5c8c2m1r1a1","sN":1,"aN":"c3c6c5c8c2m1r1a1"}'>Microsoft Defender for Endpoint</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c4c6c5c8c2m1r1a1","sN":4,"aN":"c6c5c8c2m1r1a1"}'> <a id="shellmenu_92" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-xdr" data-m='{"id":"n1c4c6c5c8c2m1r1a1","sN":1,"aN":"c4c6c5c8c2m1r1a1"}'>Microsoft Defender XDR</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_DefenderforBusiness_cont","cT":"Container","id":"c5c6c5c8c2m1r1a1","sN":5,"aN":"c6c5c8c2m1r1a1"}'> <a id="shellmenu_93" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/endpoint-security/microsoft-defender-business" data-m='{"cN":"CatNav_Products_DefenderforBusiness_nav","id":"n1c5c6c5c8c2m1r1a1","sN":1,"aN":"c5c6c5c8c2m1r1a1"}'>Microsoft Defender for Business</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c6c6c5c8c2m1r1a1","sN":6,"aN":"c6c5c8c2m1r1a1"}'> <a id="shellmenu_94" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/endpoint-management/microsoft-intune" data-m='{"id":"n1c6c6c5c8c2m1r1a1","sN":1,"aN":"c6c6c5c8c2m1r1a1"}'>Microsoft Intune core capabilities</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_DefenderIoT_cont","cT":"Container","id":"c7c6c5c8c2m1r1a1","sN":7,"aN":"c6c5c8c2m1r1a1"}'> <a id="shellmenu_95" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/endpoint-security/microsoft-defender-iot" data-m='{"cN":"CatNav_Products_DefenderIoT_nav","id":"n1c7c6c5c8c2m1r1a1","sN":1,"aN":"c7c6c5c8c2m1r1a1"}'>Microsoft Defender for IoT</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_DefenderVulnerability_cont","cT":"Container","id":"c8c6c5c8c2m1r1a1","sN":8,"aN":"c6c5c8c2m1r1a1"}'> <a id="shellmenu_96" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/threat-protection/microsoft-defender-vulnerability-management " data-m='{"cN":"CatNav_Products_DefenderVulnerability_nav","id":"n1c8c6c5c8c2m1r1a1","sN":1,"aN":"c8c6c5c8c2m1r1a1"}'>Microsoft Defender Vulnerability Management</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c9c6c5c8c2m1r1a1","sN":9,"aN":"c6c5c8c2m1r1a1"}'> <a id="shellmenu_97" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/endpoint-management/microsoft-intune-advanced-analytics" data-m='{"id":"n1c9c6c5c8c2m1r1a1","sN":1,"aN":"c9c6c5c8c2m1r1a1"}'>Microsoft Intune Advanced Analytics</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c10c6c5c8c2m1r1a1","sN":10,"aN":"c6c5c8c2m1r1a1"}'> <a id="shellmenu_98" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/endpoint-management/microsoft-intune-endpoint-privilege-management" data-m='{"id":"n1c10c6c5c8c2m1r1a1","sN":1,"aN":"c10c6c5c8c2m1r1a1"}'>Microsoft Intune Endpoint Privilege Management</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c11c6c5c8c2m1r1a1","sN":11,"aN":"c6c5c8c2m1r1a1"}'> <a id="shellmenu_99" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/endpoint-management/microsoft-intune-enterprise-application-management" data-m='{"id":"n1c11c6c5c8c2m1r1a1","sN":1,"aN":"c11c6c5c8c2m1r1a1"}'>Microsoft Intune Enterprise Application Management</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c12c6c5c8c2m1r1a1","sN":12,"aN":"c6c5c8c2m1r1a1"}'> <a id="shellmenu_100" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/endpoint-management/microsoft-intune-remote-help" data-m='{"id":"n1c12c6c5c8c2m1r1a1","sN":1,"aN":"c12c6c5c8c2m1r1a1"}'>Microsoft Intune Remote Help</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c13c6c5c8c2m1r1a1","sN":13,"aN":"c6c5c8c2m1r1a1"}'> <a id="shellmenu_101" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/endpoint-management/microsoft-cloud-pki" data-m='{"id":"n1c13c6c5c8c2m1r1a1","sN":1,"aN":"c13c6c5c8c2m1r1a1"}'>Microsoft Cloud PKI</a> </li> </ul> </li> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c7c5c8c2m1r1a1","sN":7,"aN":"c5c8c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_102-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c7c5c8c2m1r1a1","sN":1,"aN":"c7c5c8c2m1r1a1"}'>Compliance & privacy</span> <button id="uhf-navbtn-shellmenu_102-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c7c5c8c2m1r1a1","sN":2,"aN":"c7c5c8c2m1r1a1"}'>Compliance & privacy</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_102-span"> <li class="js-nav-menu single-link" data-m='{"cN":"Products_PurviewCommunicationCompliance_cont","cT":"Container","id":"c3c7c5c8c2m1r1a1","sN":3,"aN":"c7c5c8c2m1r1a1"}'> <a id="shellmenu_103" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/risk-management/microsoft-purview-communication-compliance" data-m='{"cN":"CatNav_Products_PurviewCommunicationCompliance_nav","id":"n1c3c7c5c8c2m1r1a1","sN":1,"aN":"c3c7c5c8c2m1r1a1"}'>Microsoft Purview Communication Compliance</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_PurviewComplianceManager_cont","cT":"Container","id":"c4c7c5c8c2m1r1a1","sN":4,"aN":"c7c5c8c2m1r1a1"}'> <a id="shellmenu_104" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/risk-management/microsoft-purview-compliance-manager" data-m='{"cN":"CatNav_Products_PurviewComplianceManager_nav","id":"n1c4c7c5c8c2m1r1a1","sN":1,"aN":"c4c7c5c8c2m1r1a1"}'>Microsoft Purview Compliance Manager</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_PurviewDataLifecycleManagement_cont","cT":"Container","id":"c5c7c5c8c2m1r1a1","sN":5,"aN":"c7c5c8c2m1r1a1"}'> <a id="shellmenu_105" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/information-protection/microsoft-purview-data-lifecycle-management" data-m='{"cN":"CatNav_Products_PurviewDataLifecycleManagement_nav","id":"n1c5c7c5c8c2m1r1a1","sN":1,"aN":"c5c7c5c8c2m1r1a1"}'>Microsoft Purview Data Lifecycle Management</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_PurvieweDiscovery_cont","cT":"Container","id":"c6c7c5c8c2m1r1a1","sN":6,"aN":"c7c5c8c2m1r1a1"}'> <a id="shellmenu_106" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/risk-management/microsoft-purview-ediscovery" data-m='{"cN":"CatNav_Products_PurvieweDiscovery_nav","id":"n1c6c7c5c8c2m1r1a1","sN":1,"aN":"c6c7c5c8c2m1r1a1"}'>Microsoft Purview eDiscovery </a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_PurviewAudit_cont","cT":"Container","id":"c7c7c5c8c2m1r1a1","sN":7,"aN":"c7c5c8c2m1r1a1"}'> <a id="shellmenu_107" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/risk-management/microsoft-purview-audit" data-m='{"cN":"CatNav_Products_PurviewAudit_nav","id":"n1c7c7c5c8c2m1r1a1","sN":1,"aN":"c7c7c5c8c2m1r1a1"}'>Microsoft Purview Audit</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_PrivaRiskManagement_cont","cT":"Container","id":"c8c7c5c8c2m1r1a1","sN":8,"aN":"c7c5c8c2m1r1a1"}'> <a id="shellmenu_108" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/security/business/privacy/microsoft-priva-risk-management" data-m='{"cN":"CatNav_Products_PrivaRiskManagement_nav","id":"n1c8c7c5c8c2m1r1a1","sN":1,"aN":"c8c7c5c8c2m1r1a1"}'>Microsoft Priva Risk Management</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_PrivaSubjectRightsRequests_cont","cT":"Container","id":"c9c7c5c8c2m1r1a1","sN":9,"aN":"c7c5c8c2m1r1a1"}'> <a id="shellmenu_109" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/security/business/privacy/microsoft-priva-subject-rights-requests" data-m='{"cN":"CatNav_Products_PrivaSubjectRightsRequests_nav","id":"n1c9c7c5c8c2m1r1a1","sN":1,"aN":"c9c7c5c8c2m1r1a1"}'>Microsoft Priva Subject Rights Requests</a> </li> </ul> </li> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c8c5c8c2m1r1a1","sN":8,"aN":"c5c8c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_110-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c8c5c8c2m1r1a1","sN":1,"aN":"c8c5c8c2m1r1a1"}'>Data security & governance</span> <button id="uhf-navbtn-shellmenu_110-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c8c5c8c2m1r1a1","sN":2,"aN":"c8c5c8c2m1r1a1"}'>Data security & governance</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_110-span"> <li class="js-nav-menu single-link" data-m='{"cN":"Products_PurviewInformationProtection_cont","cT":"Container","id":"c3c8c5c8c2m1r1a1","sN":3,"aN":"c8c5c8c2m1r1a1"}'> <a id="shellmenu_111" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/information-protection/microsoft-purview-information-protection" data-m='{"cN":"CatNav_Products_PurviewInformationProtection_nav","id":"n1c3c8c5c8c2m1r1a1","sN":1,"aN":"c3c8c5c8c2m1r1a1"}'>Microsoft Purview Information Protection</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_PurviewInsiderRiskManagement_cont","cT":"Container","id":"c4c8c5c8c2m1r1a1","sN":4,"aN":"c8c5c8c2m1r1a1"}'> <a id="shellmenu_112" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/risk-management/microsoft-purview-insider-risk-management" data-m='{"cN":"CatNav_Products_PurviewInsiderRiskManagement_nav","id":"n1c4c8c5c8c2m1r1a1","sN":1,"aN":"c4c8c5c8c2m1r1a1"}'>Microsoft Purview Insider Risk Management</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_PurviewDataLossPrevention_cont","cT":"Container","id":"c5c8c5c8c2m1r1a1","sN":5,"aN":"c8c5c8c2m1r1a1"}'> <a id="shellmenu_113" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/information-protection/microsoft-purview-data-loss-prevention" data-m='{"cN":"CatNav_Products_PurviewDataLossPrevention_nav","id":"n1c5c8c5c8c2m1r1a1","sN":1,"aN":"c5c8c5c8c2m1r1a1"}'>Microsoft Purview Data Loss Prevention</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Products_PurviewDataGovernance_cont","cT":"Container","id":"c6c8c5c8c2m1r1a1","sN":6,"aN":"c8c5c8c2m1r1a1"}'> <a id="shellmenu_114" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/risk-management/microsoft-purview-data-governance" data-m='{"cN":"CatNav_Products_PurviewDataGovernance_nav","id":"n1c6c8c5c8c2m1r1a1","sN":1,"aN":"c6c8c5c8c2m1r1a1"}'>Microsoft Purview Data Governance</a> </li> </ul> </li> </ul> </div> </li> <li class="nested-menu uhf-menu-item"> <div class="c-uhf-menu js-nav-menu"> <button type="button" id="c-shellmenu_115" aria-expanded="false" data-m='{"cN":"CatNav_Services_Overview_nonnav","id":"nn6c8c2m1r1a1","sN":6,"aN":"c8c2m1r1a1"}'>Services</button> <ul class="" data-class-idn="" aria-hidden="true" data-m='{"cN":"Services_Overview_cont","cT":"Container","id":"c7c8c2m1r1a1","sN":7,"aN":"c8c2m1r1a1"}'> <li class="js-nav-menu single-link" data-m='{"cN":"Services_MicrosoftSecurityExperts_cont","cT":"Container","id":"c1c7c8c2m1r1a1","sN":1,"aN":"c7c8c2m1r1a1"}'> <a id="c-shellmenu_116" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/services" data-m='{"cN":"CatNav_Services_MicrosoftSecurityExperts_nav","id":"n1c1c7c8c2m1r1a1","sN":1,"aN":"c1c7c8c2m1r1a1"}'>Microsoft Security Experts</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c2c7c8c2m1r1a1","sN":2,"aN":"c7c8c2m1r1a1"}'> <a id="c-shellmenu_117" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/services/microsoft-defender-experts-xdr" data-m='{"id":"n1c2c7c8c2m1r1a1","sN":1,"aN":"c2c7c8c2m1r1a1"}'>Microsoft Defender Experts for XDR</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Services_ExpertsHunting_cont","cT":"Container","id":"c3c7c8c2m1r1a1","sN":3,"aN":"c7c8c2m1r1a1"}'> <a id="c-shellmenu_118" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/services/microsoft-defender-experts-hunting" data-m='{"cN":"CatNav_Services_ExpertsHunting_nav","id":"n1c3c7c8c2m1r1a1","sN":1,"aN":"c3c7c8c2m1r1a1"}'>Microsoft Defender Experts for Hunting</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Services_ExpertsIncidentResponse_cont","cT":"Container","id":"c4c7c8c2m1r1a1","sN":4,"aN":"c7c8c2m1r1a1"}'> <a id="c-shellmenu_119" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/microsoft-incident-response" data-m='{"cN":"CatNav_Services_ExpertsIncidentResponse_nav","id":"n1c4c7c8c2m1r1a1","sN":1,"aN":"c4c7c8c2m1r1a1"}'>Microsoft Incident Response</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c5c7c8c2m1r1a1","sN":5,"aN":"c7c8c2m1r1a1"}'> <a id="c-shellmenu_120" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/services/microsoft-security-enterprise-services" data-m='{"id":"n1c5c7c8c2m1r1a1","sN":1,"aN":"c5c7c8c2m1r1a1"}'>Microsoft Security Enterprise Services</a> </li> </ul> </div> </li> <li class="single-link js-nav-menu uhf-menu-item"> <a id="c-shellmenu_121" class="c-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/partnerships" data-m='{"id":"n8c8c2m1r1a1","sN":8,"aN":"c8c2m1r1a1"}'>Partners</a> </li> <li class="nested-menu uhf-menu-item"> <div class="c-uhf-menu js-nav-menu"> <button type="button" id="c-shellmenu_122" aria-expanded="false" data-m='{"id":"nn9c8c2m1r1a1","sN":9,"aN":"c8c2m1r1a1"}'>Resources</button> <ul class="f-multi-column f-multi-column-5" data-class-idn="f-multi-column f-multi-column-5" aria-hidden="true" data-m='{"cT":"Container","id":"c10c8c2m1r1a1","sN":10,"aN":"c8c2m1r1a1"}'> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c1c10c8c2m1r1a1","sN":1,"aN":"c10c8c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_123-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c1c10c8c2m1r1a1","sN":1,"aN":"c1c10c8c2m1r1a1"}'>Get started</span> <button id="uhf-navbtn-shellmenu_123-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c1c10c8c2m1r1a1","sN":2,"aN":"c1c10c8c2m1r1a1"}'>Get started</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_123-span"> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_CybersecurityAwareness_cont","cT":"Container","id":"c3c1c10c8c2m1r1a1","sN":3,"aN":"c1c10c8c2m1r1a1"}'> <a id="shellmenu_124" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/cybersecurity-awareness" data-m='{"cN":"CatNav_Resources_CybersecurityAwareness_nav","id":"n1c3c1c10c8c2m1r1a1","sN":1,"aN":"c3c1c10c8c2m1r1a1"}'>Cybersecurity awareness</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_CustomerStories_cont","cT":"Container","id":"c4c1c10c8c2m1r1a1","sN":4,"aN":"c1c10c8c2m1r1a1"}'> <a id="shellmenu_125" class="js-subm-uhf-nav-link" href="https://customers.microsoft.com/en-us/search?sq=Microsoft%20Security&ff=&p=0&so=story_publish_date%20desc" data-m='{"cN":"CatNav_Resources_CustomerStories_nav","id":"n1c4c1c10c8c2m1r1a1","sN":1,"aN":"c4c1c10c8c2m1r1a1"}'>Customer stories</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_Security101_cont","cT":"Container","id":"c5c1c10c8c2m1r1a1","sN":5,"aN":"c1c10c8c2m1r1a1"}'> <a id="shellmenu_126" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/security-101" data-m='{"cN":"CatNav_Resources_Security101_nav","id":"n1c5c1c10c8c2m1r1a1","sN":1,"aN":"c5c1c10c8c2m1r1a1"}'>Security 101</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_GetStartedTrials_cont","cT":"Container","id":"c6c1c10c8c2m1r1a1","sN":6,"aN":"c1c10c8c2m1r1a1"}'> <a id="shellmenu_127" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/get-started/start-free-trial" data-m='{"cN":"CatNav_Resources_GetStartedTrials_nav","id":"n1c6c1c10c8c2m1r1a1","sN":1,"aN":"c6c1c10c8c2m1r1a1"}'>Product trials</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_HowWeProtectMicrosoft_cont","cT":"Container","id":"c7c1c10c8c2m1r1a1","sN":7,"aN":"c1c10c8c2m1r1a1"}'> <a id="shellmenu_128" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/insidetrack" data-m='{"cN":"CatNav_Resources_HowWeProtectMicrosoft_nav","id":"n1c7c1c10c8c2m1r1a1","sN":1,"aN":"c7c1c10c8c2m1r1a1"}'>How we protect Microsoft</a> </li> </ul> </li> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c2c10c8c2m1r1a1","sN":2,"aN":"c10c8c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_129-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c2c10c8c2m1r1a1","sN":1,"aN":"c2c10c8c2m1r1a1"}'>Reports and analysis</span> <button id="uhf-navbtn-shellmenu_129-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c2c10c8c2m1r1a1","sN":2,"aN":"c2c10c8c2m1r1a1"}'>Reports and analysis</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_129-span"> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_IndustryRecognition_cont","cT":"Container","id":"c3c2c10c8c2m1r1a1","sN":3,"aN":"c2c10c8c2m1r1a1"}'> <a id="shellmenu_130" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/reports-analysis/industry-recognized-cybersecurity-leader" data-m='{"cN":"CatNav_Resources_IndustryRecognition_nav","id":"n1c3c2c10c8c2m1r1a1","sN":1,"aN":"c3c2c10c8c2m1r1a1"}'>Industry recognition</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_SecurityInsider_cont","cT":"Container","id":"c4c2c10c8c2m1r1a1","sN":4,"aN":"c2c10c8c2m1r1a1"}'> <a id="shellmenu_131" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/security-insider/" data-m='{"cN":"CatNav_Resources_SecurityInsider_nav","id":"n1c4c2c10c8c2m1r1a1","sN":1,"aN":"c4c2c10c8c2m1r1a1"}'>Microsoft Security Insider</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_MDDR_cont","cT":"Container","id":"c5c2c10c8c2m1r1a1","sN":5,"aN":"c2c10c8c2m1r1a1"}'> <a id="shellmenu_132" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/microsoft-digital-defense-report-2024" data-m='{"cN":"CatNav_Resources_MDDR_nav","id":"n1c5c2c10c8c2m1r1a1","sN":1,"aN":"c5c2c10c8c2m1r1a1"}'>Microsoft Digital Defense Report</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_SecurityResposeCenter_cont","cT":"Container","id":"c6c2c10c8c2m1r1a1","sN":6,"aN":"c2c10c8c2m1r1a1"}'> <a id="shellmenu_133" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/msrc/" data-m='{"cN":"CatNav_Resources_SecurityResposeCenter_nav","id":"n1c6c2c10c8c2m1r1a1","sN":1,"aN":"c6c2c10c8c2m1r1a1"}'>Security Response Center</a> </li> </ul> </li> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c3c10c8c2m1r1a1","sN":3,"aN":"c10c8c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_134-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c3c10c8c2m1r1a1","sN":1,"aN":"c3c10c8c2m1r1a1"}'>Community</span> <button id="uhf-navbtn-shellmenu_134-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c3c10c8c2m1r1a1","sN":2,"aN":"c3c10c8c2m1r1a1"}'>Community</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_134-span"> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_SecurityBlog_cont","cT":"Container","id":"c3c3c10c8c2m1r1a1","sN":3,"aN":"c3c10c8c2m1r1a1"}'> <a id="shellmenu_135" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/blog/" data-m='{"cN":"CatNav_Resources_SecurityBlog_nav","id":"n1c3c3c10c8c2m1r1a1","sN":1,"aN":"c3c3c10c8c2m1r1a1"}'>Microsoft Security Blog</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_SecurityEvents_cont","cT":"Container","id":"c4c3c10c8c2m1r1a1","sN":4,"aN":"c3c10c8c2m1r1a1"}'> <a id="shellmenu_136" class="js-subm-uhf-nav-link" href="https://events.microsoft.com/en-us/allevents/?language=English&clientTimeZone=1&search=security" data-m='{"cN":"CatNav_Resources_SecurityEvents_nav","id":"n1c4c3c10c8c2m1r1a1","sN":1,"aN":"c4c3c10c8c2m1r1a1"}'>Microsoft Security Events</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_SecurityTechCommunity_cont","cT":"Container","id":"c5c3c10c8c2m1r1a1","sN":5,"aN":"c3c10c8c2m1r1a1"}'> <a id="shellmenu_137" class="js-subm-uhf-nav-link" href="https://techcommunity.microsoft.com/t5/security-compliance-and-identity/ct-p/MicrosoftSecurityandCompliance" data-m='{"cN":"CatNav_Resources_SecurityTechCommunity_nav","id":"n1c5c3c10c8c2m1r1a1","sN":1,"aN":"c5c3c10c8c2m1r1a1"}'>Microsoft Tech Community</a> </li> </ul> </li> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c4c10c8c2m1r1a1","sN":4,"aN":"c10c8c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_138-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c4c10c8c2m1r1a1","sN":1,"aN":"c4c10c8c2m1r1a1"}'>Documentation and training</span> <button id="uhf-navbtn-shellmenu_138-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c4c10c8c2m1r1a1","sN":2,"aN":"c4c10c8c2m1r1a1"}'>Documentation and training</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_138-span"> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_SecurityDocs_cont","cT":"Container","id":"c3c4c10c8c2m1r1a1","sN":3,"aN":"c4c10c8c2m1r1a1"}'> <a id="shellmenu_139" class="js-subm-uhf-nav-link" href="https://learn.microsoft.com/en-us/security/" data-m='{"cN":"CatNav_Resources_SecurityDocs_nav","id":"n1c3c4c10c8c2m1r1a1","sN":1,"aN":"c3c4c10c8c2m1r1a1"}'>Documentation</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_TechnicalContentLibrary_cont","cT":"Container","id":"c4c4c10c8c2m1r1a1","sN":4,"aN":"c4c10c8c2m1r1a1"}'> <a id="shellmenu_140" class="js-subm-uhf-nav-link" href="https://learn.microsoft.com/en-us/security" data-m='{"cN":"CatNav_Resources_TechnicalContentLibrary_nav","id":"n1c4c4c10c8c2m1r1a1","sN":1,"aN":"c4c4c10c8c2m1r1a1"}'>Technical Content Library</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_TrainingandCertifications_cont","cT":"Container","id":"c5c4c10c8c2m1r1a1","sN":5,"aN":"c4c10c8c2m1r1a1"}'> <a id="shellmenu_141" class="js-subm-uhf-nav-link" href="https://learn.microsoft.com/en-us/learn/topics/sci?wt.mc_id=techcom_header-webpage-m365" data-m='{"cN":"CatNav_Resources_TrainingandCertifications_nav","id":"n1c5c4c10c8c2m1r1a1","sN":1,"aN":"c5c4c10c8c2m1r1a1"}'>Training & certifications</a> </li> </ul> </li> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c5c10c8c2m1r1a1","sN":5,"aN":"c10c8c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_142-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c5c10c8c2m1r1a1","sN":1,"aN":"c5c10c8c2m1r1a1"}'>Additional sites</span> <button id="uhf-navbtn-shellmenu_142-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c5c10c8c2m1r1a1","sN":2,"aN":"c5c10c8c2m1r1a1"}'>Additional sites</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_142-span"> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_ComplianceProgram_cont","cT":"Container","id":"c3c5c10c8c2m1r1a1","sN":3,"aN":"c5c10c8c2m1r1a1"}'> <a id="shellmenu_143" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/services/compliance-program-microsoft-cloud" data-m='{"cN":"CatNav_Resources_ComplianceProgram_nav","id":"n1c3c5c10c8c2m1r1a1","sN":1,"aN":"c3c5c10c8c2m1r1a1"}'>Compliance Program for Microsoft Cloud</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_TrustCenter_cont","cT":"Container","id":"c4c5c10c8c2m1r1a1","sN":4,"aN":"c5c10c8c2m1r1a1"}'> <a id="shellmenu_144" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/trust-center" data-m='{"cN":"CatNav_Resources_TrustCenter_nav","id":"n1c4c5c10c8c2m1r1a1","sN":1,"aN":"c4c5c10c8c2m1r1a1"}'>Microsoft Trust Center</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_SecurityEngineeringPortal_cont","cT":"Container","id":"c5c5c10c8c2m1r1a1","sN":5,"aN":"c5c10c8c2m1r1a1"}'> <a id="shellmenu_145" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/securityengineering" data-m='{"cN":"CatNav_Resources_SecurityEngineeringPortal_nav","id":"n1c5c5c10c8c2m1r1a1","sN":1,"aN":"c5c5c10c8c2m1r1a1"}'>Security Engineering Portal</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Resources_ServiceTrustPortal_cont","cT":"Container","id":"c6c5c10c8c2m1r1a1","sN":6,"aN":"c5c10c8c2m1r1a1"}'> <a id="shellmenu_146" class="js-subm-uhf-nav-link" href="https://servicetrust.microsoft.com/" data-m='{"cN":"CatNav_Resources_ServiceTrustPortal_nav","id":"n1c6c5c10c8c2m1r1a1","sN":1,"aN":"c6c5c10c8c2m1r1a1"}'>Service Trust Portal</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Secure \u0026 govern AI_cont","cT":"Container","id":"c7c5c10c8c2m1r1a1","sN":7,"aN":"c5c10c8c2m1r1a1"}'> <a id="shellmenu_147" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/trust-center/security/secure-future-initiative" data-m='{"cN":"CatNav_Secure \u0026 govern AI_nav","id":"n1c7c5c10c8c2m1r1a1","sN":1,"aN":"c7c5c10c8c2m1r1a1"}'>Microsoft Secure Future Initiative</a> </li> <li class="js-nav-menu single-link" data-m='{"cT":"Container","id":"c8c5c10c8c2m1r1a1","sN":8,"aN":"c5c10c8c2m1r1a1"}'> <a id="shellmenu_148" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/microsoft-cloud/solutions" data-m='{"id":"n1c8c5c10c8c2m1r1a1","sN":1,"aN":"c8c5c10c8c2m1r1a1"}'>Business Solutions Hub</a> </li> </ul> </li> </ul> </div> </li> <li class="single-link js-nav-menu uhf-menu-item"> <a id="c-shellmenu_custom_newtab_contactsales_bhvr124" class="c-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/get-started/contact-us" data-m='{"cN":"CatNav_Resources_ContactSales_nav","id":"n11c8c2m1r1a1","sN":11,"aN":"c8c2m1r1a1"}'>Contact Sales</a> </li> <li class="single-link js-nav-menu uhf-menu-item"> <a id="c-shellmenu_custom_button_outline_startfreetrial_bhvr234" class="c-uhf-nav-link" href="https://www.microsoft.com/en-us/security/business/get-started/start-free-trial" data-m='{"cN":"CatNav_Resources_GetStartedTrialsButton_nav","id":"n12c8c2m1r1a1","sN":12,"aN":"c8c2m1r1a1"}'>Start free trial</a> </li> <li id="overflow-menu" class="overflow-menu x-hidden uhf-menu-item"> <div class="c-uhf-menu js-nav-menu"> <button data-m='{"pid":"More","id":"nn13c8c2m1r1a1","sN":13,"aN":"c8c2m1r1a1"}' type="button" aria-label="More" aria-expanded="false">More</button> <ul id="overflow-menu-list" aria-hidden="true" class="overflow-menu-list"> </ul> </div> </li> </ul> </nav> <div class="c-uhfh-actions" data-m='{"cN":"Header actions_cont","cT":"Container","id":"c9c2m1r1a1","sN":9,"aN":"c2m1r1a1"}'> <div class="wf-menu"> <nav id="uhf-c-nav" aria-label="All Microsoft menu" data-m='{"cN":"GlobalNav_cont","cT":"Container","id":"c1c9c2m1r1a1","sN":1,"aN":"c9c2m1r1a1"}'> <ul class="js-paddle-items"> <li> <div class="c-uhf-menu js-nav-menu"> <button type="button" class="c-button-logo all-ms-nav" aria-expanded="false" data-m='{"cN":"GlobalNav_More_nonnav","id":"nn1c1c9c2m1r1a1","sN":1,"aN":"c1c9c2m1r1a1"}'> <span>All Microsoft</span></button> <ul class="f-multi-column f-multi-column-4" aria-hidden="true" data-m='{"cN":"More_cont","cT":"Container","id":"c2c1c9c2m1r1a1","sN":2,"aN":"c1c9c2m1r1a1"}'> <li class="c-w0-contr"> <h2 class="c-uhf-sronly">Global</h2> <ul class="c-w0"> <li class="js-nav-menu single-link" data-m='{"cN":"Microsoft Security_cont","cT":"Container","id":"c1c2c1c9c2m1r1a1","sN":1,"aN":"c2c1c9c2m1r1a1"}'> <a id="shellmenu_0" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/security" data-m='{"cN":"W0Nav_Microsoft Security_nav","id":"n1c1c2c1c9c2m1r1a1","sN":1,"aN":"c1c2c1c9c2m1r1a1"}'>Microsoft Security</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Azure_cont","cT":"Container","id":"c2c2c1c9c2m1r1a1","sN":2,"aN":"c2c1c9c2m1r1a1"}'> <a id="shellmenu_1" class="js-subm-uhf-nav-link" href="https://azure.microsoft.com/en-us/" data-m='{"cN":"W0Nav_Azure_nav","id":"n1c2c2c1c9c2m1r1a1","sN":1,"aN":"c2c2c1c9c2m1r1a1"}'>Azure</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Dynamics 365_cont","cT":"Container","id":"c3c2c1c9c2m1r1a1","sN":3,"aN":"c2c1c9c2m1r1a1"}'> <a id="shellmenu_2" class="js-subm-uhf-nav-link" href="https://dynamics.microsoft.com/en-us/" data-m='{"cN":"W0Nav_Dynamics 365_nav","id":"n1c3c2c1c9c2m1r1a1","sN":1,"aN":"c3c2c1c9c2m1r1a1"}'>Dynamics 365</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Microsoft 365_cont","cT":"Container","id":"c4c2c1c9c2m1r1a1","sN":4,"aN":"c2c1c9c2m1r1a1"}'> <a id="shellmenu_3" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/microsoft-365/business/" data-m='{"cN":"W0Nav_Microsoft 365_nav","id":"n1c4c2c1c9c2m1r1a1","sN":1,"aN":"c4c2c1c9c2m1r1a1"}'>Microsoft 365</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Microsoft Teams_cont","cT":"Container","id":"c5c2c1c9c2m1r1a1","sN":5,"aN":"c2c1c9c2m1r1a1"}'> <a id="shellmenu_4" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/microsoft-teams/group-chat-software" data-m='{"cN":"W0Nav_Microsoft Teams_nav","id":"n1c5c2c1c9c2m1r1a1","sN":1,"aN":"c5c2c1c9c2m1r1a1"}'>Microsoft Teams</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"Windows 365_cont","cT":"Container","id":"c6c2c1c9c2m1r1a1","sN":6,"aN":"c2c1c9c2m1r1a1"}'> <a id="shellmenu_5" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/windows-365" data-m='{"cN":"W0Nav_Windows 365_nav","id":"n1c6c2c1c9c2m1r1a1","sN":1,"aN":"c6c2c1c9c2m1r1a1"}'>Windows 365</a> </li> </ul> </li> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c7c2c1c9c2m1r1a1","sN":7,"aN":"c2c1c9c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_7-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c7c2c1c9c2m1r1a1","sN":1,"aN":"c7c2c1c9c2m1r1a1"}'>Tech & innovation</span> <button id="uhf-navbtn-shellmenu_7-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c7c2c1c9c2m1r1a1","sN":2,"aN":"c7c2c1c9c2m1r1a1"}'>Tech & innovation</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_7-span"> <li class="js-nav-menu single-link" data-m='{"cN":"More_TechInnovation_MicrosoftCloud_cont","cT":"Container","id":"c3c7c2c1c9c2m1r1a1","sN":3,"aN":"c7c2c1c9c2m1r1a1"}'> <a id="shellmenu_8" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/microsoft-cloud" data-m='{"cN":"GlobalNav_More_TechInnovation_MicrosoftCloud_nav","id":"n1c3c7c2c1c9c2m1r1a1","sN":1,"aN":"c3c7c2c1c9c2m1r1a1"}'>Microsoft Cloud</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_TechInnovation__AI_cont","cT":"Container","id":"c4c7c2c1c9c2m1r1a1","sN":4,"aN":"c7c2c1c9c2m1r1a1"}'> <a id="shellmenu_9" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/ai" data-m='{"cN":"GlobalNav_More_TechInnovation__AI_nav","id":"n1c4c7c2c1c9c2m1r1a1","sN":1,"aN":"c4c7c2c1c9c2m1r1a1"}'>AI</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_TechInnovation_AzureSpace_cont","cT":"Container","id":"c5c7c2c1c9c2m1r1a1","sN":5,"aN":"c7c2c1c9c2m1r1a1"}'> <a id="shellmenu_10" class="js-subm-uhf-nav-link" href="https://azure.microsoft.com/en-us/solutions/space/" data-m='{"cN":"GlobalNav_More_TechInnovation_AzureSpace_nav","id":"n1c5c7c2c1c9c2m1r1a1","sN":1,"aN":"c5c7c2c1c9c2m1r1a1"}'>Azure Space</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_TechInnovation_MixedReality_cont","cT":"Container","id":"c6c7c2c1c9c2m1r1a1","sN":6,"aN":"c7c2c1c9c2m1r1a1"}'> <a id="shellmenu_11" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/mixed-reality/windows-mixed-reality" data-m='{"cN":"GlobalNav_More_TechInnovation_MixedReality_nav","id":"n1c6c7c2c1c9c2m1r1a1","sN":1,"aN":"c6c7c2c1c9c2m1r1a1"}'>Mixed reality</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_TechInnovation_MicrosoftHololens_cont","cT":"Container","id":"c7c7c2c1c9c2m1r1a1","sN":7,"aN":"c7c2c1c9c2m1r1a1"}'> <a id="shellmenu_12" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/hololens" data-m='{"cN":"GlobalNav_More_TechInnovation_MicrosoftHololens_nav","id":"n1c7c7c2c1c9c2m1r1a1","sN":1,"aN":"c7c7c2c1c9c2m1r1a1"}'>Microsoft HoloLens</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_TechInnovation_Microsoft Viva_cont","cT":"Container","id":"c8c7c2c1c9c2m1r1a1","sN":8,"aN":"c7c2c1c9c2m1r1a1"}'> <a id="shellmenu_13" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/microsoft-viva" data-m='{"cN":"GlobalNav_More_TechInnovation_Microsoft Viva_nav","id":"n1c8c7c2c1c9c2m1r1a1","sN":1,"aN":"c8c7c2c1c9c2m1r1a1"}'>Microsoft Viva</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_TechInnovation_QuantumComputing_cont","cT":"Container","id":"c9c7c2c1c9c2m1r1a1","sN":9,"aN":"c7c2c1c9c2m1r1a1"}'> <a id="shellmenu_14" class="js-subm-uhf-nav-link" href="https://azure.microsoft.com/en-us/solutions/quantum-computing/" data-m='{"cN":"GlobalNav_More_TechInnovation_QuantumComputing_nav","id":"n1c9c7c2c1c9c2m1r1a1","sN":1,"aN":"c9c7c2c1c9c2m1r1a1"}'>Quantum computing</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_TechInnovation_Sustainability_cont","cT":"Container","id":"c10c7c2c1c9c2m1r1a1","sN":10,"aN":"c7c2c1c9c2m1r1a1"}'> <a id="shellmenu_15" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/sustainability/" data-m='{"cN":"GlobalNav_More_TechInnovation_Sustainability_nav","id":"n1c10c7c2c1c9c2m1r1a1","sN":1,"aN":"c10c7c2c1c9c2m1r1a1"}'>Sustainability</a> </li> </ul> </li> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c8c2c1c9c2m1r1a1","sN":8,"aN":"c2c1c9c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_16-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c8c2c1c9c2m1r1a1","sN":1,"aN":"c8c2c1c9c2m1r1a1"}'>Industries</span> <button id="uhf-navbtn-shellmenu_16-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c8c2c1c9c2m1r1a1","sN":2,"aN":"c8c2c1c9c2m1r1a1"}'>Industries</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_16-span"> <li class="js-nav-menu single-link" data-m='{"cN":"More_Industries_Education_cont","cT":"Container","id":"c3c8c2c1c9c2m1r1a1","sN":3,"aN":"c8c2c1c9c2m1r1a1"}'> <a id="shellmenu_17" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/education" data-m='{"cN":"GlobalNav_More_Industries_Education_nav","id":"n1c3c8c2c1c9c2m1r1a1","sN":1,"aN":"c3c8c2c1c9c2m1r1a1"}'>Education</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Industries_Automotive_cont","cT":"Container","id":"c4c8c2c1c9c2m1r1a1","sN":4,"aN":"c8c2c1c9c2m1r1a1"}'> <a id="shellmenu_18" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/industry/automotive" data-m='{"cN":"GlobalNav_More_Industries_Automotive_nav","id":"n1c4c8c2c1c9c2m1r1a1","sN":1,"aN":"c4c8c2c1c9c2m1r1a1"}'>Automotive</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Industries_Financialservices_cont","cT":"Container","id":"c5c8c2c1c9c2m1r1a1","sN":5,"aN":"c8c2c1c9c2m1r1a1"}'> <a id="shellmenu_19" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/industry/financial-services/banking" data-m='{"cN":"GlobalNav_More_Industries_Financialservices_nav","id":"n1c5c8c2c1c9c2m1r1a1","sN":1,"aN":"c5c8c2c1c9c2m1r1a1"}'>Financial services</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Industries_Government_cont","cT":"Container","id":"c6c8c2c1c9c2m1r1a1","sN":6,"aN":"c8c2c1c9c2m1r1a1"}'> <a id="shellmenu_20" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/industry/government" data-m='{"cN":"GlobalNav_More_Industries_Government_nav","id":"n1c6c8c2c1c9c2m1r1a1","sN":1,"aN":"c6c8c2c1c9c2m1r1a1"}'>Government</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Industries_Health_cont","cT":"Container","id":"c7c8c2c1c9c2m1r1a1","sN":7,"aN":"c8c2c1c9c2m1r1a1"}'> <a id="shellmenu_21" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/industry/health/microsoft-cloud-for-healthcare" data-m='{"cN":"GlobalNav_More_Industries_Health_nav","id":"n1c7c8c2c1c9c2m1r1a1","sN":1,"aN":"c7c8c2c1c9c2m1r1a1"}'>Healthcare</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Industries_Manufacturing_cont","cT":"Container","id":"c8c8c2c1c9c2m1r1a1","sN":8,"aN":"c8c2c1c9c2m1r1a1"}'> <a id="shellmenu_22" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/industry/manufacturing/microsoft-cloud-for-manufacturing" data-m='{"cN":"GlobalNav_More_Industries_Manufacturing_nav","id":"n1c8c8c2c1c9c2m1r1a1","sN":1,"aN":"c8c8c2c1c9c2m1r1a1"}'>Manufacturing</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Industries_Retail_cont","cT":"Container","id":"c9c8c2c1c9c2m1r1a1","sN":9,"aN":"c8c2c1c9c2m1r1a1"}'> <a id="shellmenu_23" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/industry/consumer-goods" data-m='{"cN":"GlobalNav_More_Industries_Retail_nav","id":"n1c9c8c2c1c9c2m1r1a1","sN":1,"aN":"c9c8c2c1c9c2m1r1a1"}'>Retail</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Industries_Allindustries_cont","cT":"Container","id":"c10c8c2c1c9c2m1r1a1","sN":10,"aN":"c8c2c1c9c2m1r1a1"}'> <a id="shellmenu_24" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/industry" data-m='{"cN":"GlobalNav_More_Industries_Allindustries_nav","id":"n1c10c8c2c1c9c2m1r1a1","sN":1,"aN":"c10c8c2c1c9c2m1r1a1"}'>All industries</a> </li> </ul> </li> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c9c2c1c9c2m1r1a1","sN":9,"aN":"c2c1c9c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_25-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c9c2c1c9c2m1r1a1","sN":1,"aN":"c9c2c1c9c2m1r1a1"}'>Partners</span> <button id="uhf-navbtn-shellmenu_25-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c9c2c1c9c2m1r1a1","sN":2,"aN":"c9c2c1c9c2m1r1a1"}'>Partners</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_25-span"> <li class="js-nav-menu single-link" data-m='{"cN":"More_Partner_FindPartner_cont","cT":"Container","id":"c3c9c2c1c9c2m1r1a1","sN":3,"aN":"c9c2c1c9c2m1r1a1"}'> <a id="shellmenu_26" class="js-subm-uhf-nav-link" href="https://partner.microsoft.com/en-US/" data-m='{"cN":"GlobalNav_More_Partner_FindPartner_nav","id":"n1c3c9c2c1c9c2m1r1a1","sN":1,"aN":"c3c9c2c1c9c2m1r1a1"}'>Find a partner</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Partner_BecomePartner_cont","cT":"Container","id":"c4c9c2c1c9c2m1r1a1","sN":4,"aN":"c9c2c1c9c2m1r1a1"}'> <a id="shellmenu_27" class="js-subm-uhf-nav-link" href="https://partner.microsoft.com/en-US/membership/cloud-solution-provider" data-m='{"cN":"GlobalNav_More_Partner_BecomePartner_nav","id":"n1c4c9c2c1c9c2m1r1a1","sN":1,"aN":"c4c9c2c1c9c2m1r1a1"}'>Become a partner</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Partner_PartnerNetwork_cont","cT":"Container","id":"c5c9c2c1c9c2m1r1a1","sN":5,"aN":"c9c2c1c9c2m1r1a1"}'> <a id="shellmenu_28" class="js-subm-uhf-nav-link" href="https://partner.microsoft.com/en-us/membership" data-m='{"cN":"GlobalNav_More_Partner_PartnerNetwork_nav","id":"n1c5c9c2c1c9c2m1r1a1","sN":1,"aN":"c5c9c2c1c9c2m1r1a1"}'>Partner Network</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Partner_AzureMarketplace_cont","cT":"Container","id":"c6c9c2c1c9c2m1r1a1","sN":6,"aN":"c9c2c1c9c2m1r1a1"}'> <a id="shellmenu_29" class="js-subm-uhf-nav-link" href="https://azuremarketplace.microsoft.com/en-us/" data-m='{"cN":"GlobalNav_More_Partner_AzureMarketplace_nav","id":"n1c6c9c2c1c9c2m1r1a1","sN":1,"aN":"c6c9c2c1c9c2m1r1a1"}'>Azure Marketplace</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Partner_AppSource_cont","cT":"Container","id":"c7c9c2c1c9c2m1r1a1","sN":7,"aN":"c9c2c1c9c2m1r1a1"}'> <a id="shellmenu_30" class="js-subm-uhf-nav-link" href="https://appsource.microsoft.com/en-us/" data-m='{"cN":"GlobalNav_More_Partner_AppSource_nav","id":"n1c7c9c2c1c9c2m1r1a1","sN":1,"aN":"c7c9c2c1c9c2m1r1a1"}'>AppSource</a> </li> </ul> </li> <li class="f-sub-menu js-nav-menu nested-menu" data-m='{"cT":"Container","id":"c10c2c1c9c2m1r1a1","sN":10,"aN":"c2c1c9c2m1r1a1"}'> <span id="uhf-navspn-shellmenu_31-span" style="display:none" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn1c10c2c1c9c2m1r1a1","sN":1,"aN":"c10c2c1c9c2m1r1a1"}'>Resources</span> <button id="uhf-navbtn-shellmenu_31-button" type="button" f-multi-parent="true" aria-expanded="false" data-m='{"id":"nn2c10c2c1c9c2m1r1a1","sN":2,"aN":"c10c2c1c9c2m1r1a1"}'>Resources</button> <ul aria-hidden="true" aria-labelledby="uhf-navspn-shellmenu_31-span"> <li class="js-nav-menu single-link" data-m='{"cN":"More_Resources_Blog_cont","cT":"Container","id":"c3c10c2c1c9c2m1r1a1","sN":3,"aN":"c10c2c1c9c2m1r1a1"}'> <a id="shellmenu_32" class="js-subm-uhf-nav-link" href="https://blogs.microsoft.com/" data-m='{"cN":"GlobalNav_More_Resources_Blog_nav","id":"n1c3c10c2c1c9c2m1r1a1","sN":1,"aN":"c3c10c2c1c9c2m1r1a1"}'>Blog</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Resources_MicrosoftAdvertising_cont","cT":"Container","id":"c4c10c2c1c9c2m1r1a1","sN":4,"aN":"c10c2c1c9c2m1r1a1"}'> <a id="shellmenu_33" class="js-subm-uhf-nav-link" href="https://about.ads.microsoft.com/en-us?s_cid=dig-src_uhfcomm" data-m='{"cN":"GlobalNav_More_Resources_MicrosoftAdvertising_nav","id":"n1c4c10c2c1c9c2m1r1a1","sN":1,"aN":"c4c10c2c1c9c2m1r1a1"}'>Microsoft Advertising</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Resources_DeveloperCenter_cont","cT":"Container","id":"c5c10c2c1c9c2m1r1a1","sN":5,"aN":"c10c2c1c9c2m1r1a1"}'> <a id="shellmenu_34" class="js-subm-uhf-nav-link" href="https://developer.microsoft.com/en-us/" data-m='{"cN":"GlobalNav_More_Resources_DeveloperCenter_nav","id":"n1c5c10c2c1c9c2m1r1a1","sN":1,"aN":"c5c10c2c1c9c2m1r1a1"}'>Developer Center</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Resources_Documentation_cont","cT":"Container","id":"c6c10c2c1c9c2m1r1a1","sN":6,"aN":"c10c2c1c9c2m1r1a1"}'> <a id="shellmenu_35" class="js-subm-uhf-nav-link" href="https://learn.microsoft.com/docs/" data-m='{"cN":"GlobalNav_More_Resources_Documentation_nav","id":"n1c6c10c2c1c9c2m1r1a1","sN":1,"aN":"c6c10c2c1c9c2m1r1a1"}'>Documentation</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Resources_Events_cont","cT":"Container","id":"c7c10c2c1c9c2m1r1a1","sN":7,"aN":"c10c2c1c9c2m1r1a1"}'> <a id="shellmenu_36" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/events" data-m='{"cN":"GlobalNav_More_Resources_Events_nav","id":"n1c7c10c2c1c9c2m1r1a1","sN":1,"aN":"c7c10c2c1c9c2m1r1a1"}'>Events</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Resources_Licensing_cont","cT":"Container","id":"c8c10c2c1c9c2m1r1a1","sN":8,"aN":"c10c2c1c9c2m1r1a1"}'> <a id="shellmenu_37" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/licensing/" data-m='{"cN":"GlobalNav_More_Resources_Licensing_nav","id":"n1c8c10c2c1c9c2m1r1a1","sN":1,"aN":"c8c10c2c1c9c2m1r1a1"}'>Licensing</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Resources_MicrosoftLearn_cont","cT":"Container","id":"c9c10c2c1c9c2m1r1a1","sN":9,"aN":"c10c2c1c9c2m1r1a1"}'> <a id="shellmenu_38" class="js-subm-uhf-nav-link" href="https://learn.microsoft.com/" data-m='{"cN":"GlobalNav_More_Resources_MicrosoftLearn_nav","id":"n1c9c10c2c1c9c2m1r1a1","sN":1,"aN":"c9c10c2c1c9c2m1r1a1"}'>Microsoft Learn</a> </li> <li class="js-nav-menu single-link" data-m='{"cN":"More_Resources_MicrosoftResearch_cont","cT":"Container","id":"c10c10c2c1c9c2m1r1a1","sN":10,"aN":"c10c2c1c9c2m1r1a1"}'> <a id="shellmenu_39" class="js-subm-uhf-nav-link" href="https://www.microsoft.com/en-us/research/" data-m='{"cN":"GlobalNav_More_Resources_MicrosoftResearch_nav","id":"n1c10c10c2c1c9c2m1r1a1","sN":1,"aN":"c10c10c2c1c9c2m1r1a1"}'>Microsoft Research</a> </li> </ul> </li> <li class="f-multi-column-info"> <a data-m='{"id":"n11c2c1c9c2m1r1a1","sN":11,"aN":"c2c1c9c2m1r1a1"}' href="https://www.microsoft.com/en-us/sitemap" aria-label="" class="c-glyph">View Sitemap</a> </li> </ul> </div> </li> </ul> </nav> </div> <form class="c-search" autocomplete="off" id="searchForm" name="searchForm" role="search" action="https://www.microsoft.com/en-us/security/site-search" method="GET" data-seAutoSuggest='' data-seautosuggestapi="https://www.microsoft.com/msstoreapiprod/api/autosuggest" data-m='{"cN":"GlobalNav_Search_cont","cT":"Container","id":"c3c1c9c2m1r1a1","sN":3,"aN":"c1c9c2m1r1a1"}' aria-expanded="false"> <input id="cli_shellHeaderSearchInput" aria-label="Search Expanded" aria-autocomplete="list" aria-expanded="false" aria-controls="universal-header-search-auto-suggest-transparent" aria-owns="universal-header-search-auto-suggest-ul" type="search" name="q" role="combobox" placeholder="Search Microsoft Security" data-m='{"cN":"SearchBox_nav","id":"n1c3c1c9c2m1r1a1","sN":1,"aN":"c3c1c9c2m1r1a1"}' data-toggle="tooltip" data-placement="right" title="Search Microsoft Security" /> <button id="search" aria-label="Search Microsoft Security" class="c-glyph" data-m='{"cN":"Search_nav","id":"n2c3c1c9c2m1r1a1","sN":2,"aN":"c3c1c9c2m1r1a1"}' data-bi-mto="true" aria-expanded="false" disabled="disabled"> <span role="presentation">Search</span> <span role="tooltip" class="c-uhf-tooltip c-uhf-search-tooltip">Search Microsoft Security</span> </button> <div class="m-auto-suggest" id="universal-header-search-auto-suggest-transparent" role="group"> <ul class="c-menu" id="universal-header-search-auto-suggest-ul" aria-label="Search Suggestions" aria-hidden="true" data-bi-dnt="true" data-bi-mto="true" data-js-auto-suggest-position="default" role="listbox" data-tel="jsll" data-m='{"cN":"search suggestions_cont","cT":"Container","id":"c3c3c1c9c2m1r1a1","sN":3,"aN":"c3c1c9c2m1r1a1"}'></ul> <ul class="c-menu f-auto-suggest-no-results" aria-hidden="true" data-js-auto-suggest-postion="default" data-js-auto-suggest-position="default" role="listbox"> <li class="c-menu-item"> <span tabindex="-1">No results</span></li> </ul> </div> </form> <button data-m='{"cN":"cancel-search","pid":"Cancel Search","id":"nn4c1c9c2m1r1a1","sN":4,"aN":"c1c9c2m1r1a1"}' id="cancel-search" class="cancel-search" aria-label="Cancel Search"> <span>Cancel</span> </button> </div> </div> </div> </header> </div> </div> </div> <div id="header-container" class="header-container"> </div> <div class="search-header pt-0 pb-g py-md-4 material-card border-bottom border-top border-neutral-300 border-top"> <div class="container"> <div class="front-page__navigation-search row justify-content-between align-items-center"> <div class="col-12 col-md"> <div class="search-header-breadcrumb d-flex py-g py-md-0" data-bi-an="Breadcrumb"> <nav class="flex-grow-1 pr-3" aria-label="Your location in the site" > <ol class="breadcrumb p-0 m-0"> <li class="breadcrumb-item d-inline-flex"> <span class="breadcrumbs__icon glyph-prepend glyph-prepend-home mr-2 d-flex align-items-center text-neutral-600"></span> <a class="small" data-bi-cn="Blog home" data-bi-ct="breadcrumb link" href="https://www.microsoft.com/en-us/security/blog/" > Blog home </a> </li> <li class="breadcrumb-item active small" aria-current="page">Content type: Research</li> </ol> </nav> </div> </div> <div class="col-12 col-md-4 border-top border-neutral-300 border-top-md-0"> <div id="header-search" class="header-search pt-g pt-md-0"> <div id="header-search-content" class="header-search__content"> <div itemscope itemtype="http://schema.org/WebSite"> <form role="search" id="searchform-1" action="https://www.microsoft.com/en-us/security/blog/" class="search-form" type="searchForm" > <meta itemprop="target" content="https://www.microsoft.com/en-us/security/blog/?s={s}" /> <label for="searchform-1-field" class="sr-only"> Search the Microsoft security blog </label> <div class="bg-white dark-bg-gray-900 dark-text-white dark-border-gray-700 border border-gray-300 d-flex"> <input itemprop="query-input" class="form-control form-control-sm border-0 flex-grow-1 h-100 py-2" type="search" id="searchform-1-field" name="s" placeholder="Search the blog" value="" > <button class="btn btn-link-secondary m-0 py-1" type="submit"> <span class="sr-only">Submit</span> <span class="svg" aria-hidden="true"> <svg xmlns="http://www.w3.org/2000/svg" width="13" height="12" fill="none" viewBox="0 0 12 13"><path fill="#4C4C51" d="M4.833.097a4.833 4.833 0 0 1 3.753 7.879l3.268 3.267a.5.5 0 0 1-.651.756l-.057-.049L7.88 8.683A4.833 4.833 0 1 1 4.833.097m0 1a3.833 3.833 0 1 0 0 7.666 3.833 3.833 0 0 0 0-7.666" /></svg> </span> </button> </div> </form> </div> </div> </div> </div> </div> </div> </div> <div class="page-banner page-banner--small px-3 py-5 mb-5 bg-gray-100 dark-bg-black" style=""> <div class="container"> <h1 class="my-0 offset-md-3 text-center text-md-left"> Content type: Research </h1> </div> </div> <main id="mainContent"> <div class="container"> <div id="faceted-search" class="faceted-search search__faceted-search mb-5"> <div class="row"> <div class="col col-12 col-lg-3"> <aside class="faceted-search__sidebar mb-5" data-bi-an="Current Selections"> <div class="current-selections py-3 pt-md-0 pb-md-4"> <h2 class="small font-italic text-neutral-600 pb-2 m-0"> Current Selections </h2> <ul class="list-unstyled m-0 p-0 d-flex flex-column" id="faceted-search-selected"> <li class="pb-2"> <button type="button" class="btn btn-sm glyph-append glyph-append-xsmall glyph-append-cancel font-weight-normal py-2 current-selections__selection bg-gray-100 dark-bg-black text-body dark-border-gray-700 rounded-sm" aria-label="Remove Sort by: Newest to oldest filter" data-bi-cn="Sort by: Newest to oldest" data-bi-ct="filter removal" data-bi-bhvr="5" > Sort by: Newest to oldest </button> </li> <li class="pb-2"> <button type="button" class="btn btn-sm glyph-append glyph-append-xsmall glyph-append-cancel font-weight-normal py-2 current-selections__selection bg-gray-100 dark-bg-black text-body dark-border-gray-700 rounded-sm" disabled='disabled' aria-label="Remove Content type: Research filter" data-bi-cn="Content type: Research" data-bi-ct="filter removal" data-bi-bhvr="5" > Content type: Research </button> </li> <li class="pb-2"> <button type="button" class="btn btn-sm glyph-append glyph-append-xsmall glyph-append-cancel font-weight-normal py-2 current-selections__selection bg-gray-100 dark-bg-black text-body dark-border-gray-700 rounded-sm" disabled='disabled' aria-label="Remove Date: All dates filter" data-bi-cn="Date: All dates" data-bi-ct="filter removal" data-bi-bhvr="5" > Date: All dates </button> </li> </ul> <button type="button" class="btn btn-sm btn-link glyph-prepend glyph-prepend-xsmall glyph-prepend-cancel font-weight-normal py-1 current-selections__clear" data-bi-ct="filter removal" data-bi-bhvr="5" hidden > <span>Clear selections</span> </button> </div> <button id="facet-toggle" class="faceted-search__toggle-button btn btn-primary btn-block" type="button" aria-controls="faceted-search-container" aria-expanded="false" > <span>Refine results</span> <span aria-hidden="true" class="glyph-prepend glyph-prepend-chevron-down d-inline-block"></span> </button> <div class="faceted-search__toggle-content material-card px-3 py-4 depth-8 border-top border-width-2 border-neutral-100" id="faceted-search-container"> <h2 class="faceted-search__heading h6 m-0" id="faceted-search-form-heading"> Refine results </h2> <div class="sr-only" id="faceted-search-msg"> This form will update the search results and the form fields automatically when input state is changed or when the form is submitted. Currently selected items and filters are under the "current selections" heading and can be clicked to remove them from filtering. </div> <form id="faceted-search-form" method="get" action="https://www.microsoft.com/en-us/security/blog/" aria-labelledby="faceted-search-form-heading" aria-describedby="faceted-search-msg" class="faceted-search__form" > <input type="hidden" value="" name="s" /> <div class="form-filters"> <div class="form-filters__group py-4"> <label for="query" class="small font-italic text-neutral-600"> Search within these results </label> <div class="bg-white dark-bg-gray-900 dark-text-white dark-border-gray-700 border border-gray-300 d-flex"> <input class="search-input form-control border-0 rounded-sm flex-grow-1 h-100 py-1" itemprop="query-input" type="text" id="query" value="" name="s" /> <button class="btn btn-link-secondary m-0 py-1"> <span class="sr-only">Submit</span> <span class="d-flex" aria-hidden="true"> <svg fill="none" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 12 13" width="12" height="13"> <path d="M4.833.097a4.833 4.833 0 0 1 3.753 7.879l3.268 3.267a.5.5 0 0 1-.651.756l-.057-.049L7.88 8.683A4.833 4.833 0 1 1 4.833.097Zm0 1a3.833 3.833 0 1 0 0 7.666 3.833 3.833 0 0 0 0-7.666Z" fill="#4C4C51"/> </svg> </span> </button> </div> </div> <div class="form-filters__group py-4 border-top hidden" data-facet data-id="orderby-filter"> <fieldset class="form-group m-0"> <legend class="h6 mb-g"> Sort by </legend> <div class="facet facet--list" id="orderby-filter"> <div class="custom-control custom-radio "> <input class="custom-control-input" type="radio" name="sort-by" id="orderby-relevance" value="relevance" data-bi-cn="Relevance" data-bi-ct="select filter" > <label class="custom-control-label" for="orderby-relevance" aria-label="Relevance" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Relevance </span> </label> </div> <div class="custom-control custom-radio "> <input class="custom-control-input" type="radio" name="sort-by" id="orderby-newest-oldest" value="newest-oldest" checked='checked' data-bi-cn="Newest to oldest" data-bi-ct="select filter" > <label class="custom-control-label" for="orderby-newest-oldest" aria-label="Newest to oldest" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Newest to oldest </span> </label> </div> <div class="custom-control custom-radio "> <input class="custom-control-input" type="radio" name="sort-by" id="orderby-oldest-newest" value="oldest-newest" data-bi-cn="Oldest to newest" data-bi-ct="select filter" > <label class="custom-control-label" for="orderby-oldest-newest" aria-label="Oldest to newest" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Oldest to newest </span> </label> </div> </div> </fieldset> </div> <div class="form-filters__group py-4 border-top " data-facet data-id="taxonomy-cc0af601bfd673427a8abb171f62c707"> <fieldset class="form-group m-0"> <legend class="h6 mb-g"> Content type </legend> <div class="facet facet--list" id="taxonomy-cc0af601bfd673427a8abb171f62c707"> <div class="custom-control custom-checkbox hidden"> <input class="custom-control-input" type="checkbox" name="content-type[]" id="term-3663" value="research" checked='checked' data-bi-cn="Research" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3663" aria-label="Research" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Research </span> <span class="custom-control-label__amt">(345)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="content-type[]" id="term-3661" value="industry-trends" data-bi-cn="Industry trends" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3661" aria-label="Industry trends" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Industry trends </span> <span class="custom-control-label__amt">(3)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="content-type[]" id="term-3662" value="news" data-bi-cn="News" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3662" aria-label="News" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> News </span> <span class="custom-control-label__amt">(2)</span> </label> </div> </div> </fieldset> </div> <div class="form-filters__group py-4 border-top " data-facet data-id="taxonomy-9d9b68ac2b1de18d3712096354b3c3a5"> <fieldset class="form-group m-0"> <legend class="h6 mb-g"> Topic </legend> <div class="facet facet--toggle" id="taxonomy-9d9b68ac2b1de18d3712096354b3c3a5"> <div class="facet__expand-collapse"> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3687" value="threat-intelligence" data-bi-cn="Threat intelligence" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3687" aria-label="Threat intelligence" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Threat intelligence </span> <span class="custom-control-label__amt">(336)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3674" value="incident-response" data-bi-cn="Incident response" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3674" aria-label="Incident response" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Incident response </span> <span class="custom-control-label__amt">(30)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3664" value="ai-and-machine-learning" data-bi-cn="AI and machine learning" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3664" aria-label="AI and machine learning" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> AI and machine learning </span> <span class="custom-control-label__amt">(11)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3672" value="endpoint-security" data-bi-cn="Endpoint security" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3672" aria-label="Endpoint security" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Endpoint security </span> <span class="custom-control-label__amt">(6)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3684" value="security-operations" data-bi-cn="Security operations" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3684" aria-label="Security operations" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Security operations </span> <span class="custom-control-label__amt">(5)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3676" value="iot-security" data-bi-cn="IoT security" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3676" aria-label="IoT security" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> IoT security </span> <span class="custom-control-label__amt">(4)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3688" value="threat-trends" data-bi-cn="Threat trends" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3688" aria-label="Threat trends" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Threat trends </span> <span class="custom-control-label__amt">(4)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3665" value="analyst-reports" data-bi-cn="Analyst reports" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3665" aria-label="Analyst reports" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Analyst reports </span> <span class="custom-control-label__amt">(3)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3667" value="cloud-security" data-bi-cn="Cloud security" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3667" aria-label="Cloud security" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Cloud security </span> <span class="custom-control-label__amt">(3)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3671" value="email-security" data-bi-cn="Email security" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3671" aria-label="Email security" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Email security </span> <span class="custom-control-label__amt">(2)</span> </label> </div> <div id="facet-topic-expand-collapse" aria-hidden="true" class="collapse" role="region" > <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3673" value="identity-and-access-management" data-bi-cn="Identity and access management" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3673" aria-label="Identity and access management" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Identity and access management </span> <span class="custom-control-label__amt">(2)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3686" value="small-and-medium-business" data-bi-cn="Small and medium business" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3686" aria-label="Small and medium business" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Small and medium business </span> <span class="custom-control-label__amt">(2)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3689" value="zero-trust" data-bi-cn="Zero Trust" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3689" aria-label="Zero Trust" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Zero Trust </span> <span class="custom-control-label__amt">(2)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-4121" value="data-security" data-bi-cn="Data security" data-bi-ct="select filter" > <label class="custom-control-label" for="term-4121" aria-label="Data security" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Data security </span> <span class="custom-control-label__amt">(1)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3678" value="multifactor-authentication" data-bi-cn="Multifactor authentication" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3678" aria-label="Multifactor authentication" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Multifactor authentication </span> <span class="custom-control-label__amt">(1)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3683" value="security-management" data-bi-cn="Security management" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3683" aria-label="Security management" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Security management </span> <span class="custom-control-label__amt">(1)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="topic[]" id="term-3685" value="siem-and-xdr" data-bi-cn="SIEM and XDR" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3685" aria-label="SIEM and XDR" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> SIEM and XDR </span> <span class="custom-control-label__amt">(1)</span> </label> </div> </div> <button aria-controls="facet-topic-expand-collapse" aria-expanded="false" class="btn btn-link btn-sm px-0 faceted-search__expand-link" data-button-expand data-target="#facet-topic-expand-collapse" type="button" > + View all 17 </button> </div> </div> </fieldset> </div> <div class="form-filters__group py-4 border-top " data-facet data-id="taxonomy-86024cad1e83101d97359d7351051156"> <fieldset class="form-group m-0"> <legend class="h6 mb-g"> Products and services </legend> <div class="facet facet--toggle" id="taxonomy-86024cad1e83101d97359d7351051156"> <div class="facet__expand-collapse"> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3690" value="microsoft-defender" data-bi-cn="Microsoft Defender" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3690" aria-label="Microsoft Defender" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Defender </span> <span class="custom-control-label__amt">(114)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3694" value="microsoft-defender-for-endpoint" data-bi-cn="Microsoft Defender for Endpoint" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3694" aria-label="Microsoft Defender for Endpoint" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Defender for Endpoint </span> <span class="custom-control-label__amt">(71)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3693" value="microsoft-defender-xdr" data-bi-cn="Microsoft Defender XDR" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3693" aria-label="Microsoft Defender XDR" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Defender XDR </span> <span class="custom-control-label__amt">(43)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3726" value="microsoft-sentinel" data-bi-cn="Microsoft Sentinel" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3726" aria-label="Microsoft Sentinel" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Sentinel </span> <span class="custom-control-label__amt">(23)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3695" value="microsoft-defender-for-office-365" data-bi-cn="Microsoft Defender for Office 365" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3695" aria-label="Microsoft Defender for Office 365" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Defender for Office 365 </span> <span class="custom-control-label__amt">(20)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3698" value="microsoft-defender-threat-intelligence" data-bi-cn="Microsoft Defender Threat Intelligence" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3698" aria-label="Microsoft Defender Threat Intelligence" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Defender Threat Intelligence </span> <span class="custom-control-label__amt">(14)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3692" value="microsoft-defender-for-cloud-apps" data-bi-cn="Microsoft Defender for Cloud Apps" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3692" aria-label="Microsoft Defender for Cloud Apps" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Defender for Cloud Apps </span> <span class="custom-control-label__amt">(12)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3856" value="microsoft-defender-vulnerability-management" data-bi-cn="Microsoft Defender Vulnerability Management" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3856" aria-label="Microsoft Defender Vulnerability Management" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Defender Vulnerability Management </span> <span class="custom-control-label__amt">(11)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3720" value="microsoft-security-experts" data-bi-cn="Microsoft Security Experts" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3720" aria-label="Microsoft Security Experts" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Security Experts </span> <span class="custom-control-label__amt">(10)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3696" value="microsoft-defender-for-identity" data-bi-cn="Microsoft Defender for Identity" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3696" aria-label="Microsoft Defender for Identity" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Defender for Identity </span> <span class="custom-control-label__amt">(9)</span> </label> </div> <div id="facet-products-expand-collapse" aria-hidden="true" class="collapse" role="region" > <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3699" value="microsoft-defender-for-iot" data-bi-cn="Microsoft Defender for IoT" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3699" aria-label="Microsoft Defender for IoT" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Defender for IoT </span> <span class="custom-control-label__amt">(9)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3702" value="microsoft-entra" data-bi-cn="Microsoft Entra" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3702" aria-label="Microsoft Entra" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Entra </span> <span class="custom-control-label__amt">(9)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3691" value="microsoft-defender-for-cloud" data-bi-cn="Microsoft Defender for Cloud" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3691" aria-label="Microsoft Defender for Cloud" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Defender for Cloud </span> <span class="custom-control-label__amt">(8)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3703" value="microsoft-entra-id" data-bi-cn="Microsoft Entra ID" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3703" aria-label="Microsoft Entra ID" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Entra ID </span> <span class="custom-control-label__amt">(6)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3854" value="microsoft-incident-response" data-bi-cn="Microsoft Incident Response" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3854" aria-label="Microsoft Incident Response" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Incident Response </span> <span class="custom-control-label__amt">(6)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3721" value="microsoft-defender-experts-for-hunting" data-bi-cn="Microsoft Defender Experts for Hunting" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3721" aria-label="Microsoft Defender Experts for Hunting" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Defender Experts for Hunting </span> <span class="custom-control-label__amt">(5)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3719" value="microsoft-security-copilot" data-bi-cn="Microsoft Security Copilot" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3719" aria-label="Microsoft Security Copilot" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Security Copilot </span> <span class="custom-control-label__amt">(4)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-4139" value="microsoft-entra-id-protection" data-bi-cn="Microsoft Entra ID Protection" data-bi-ct="select filter" > <label class="custom-control-label" for="term-4139" aria-label="Microsoft Entra ID Protection" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Entra ID Protection </span> <span class="custom-control-label__amt">(3)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3851" value="microsoft-defender-experts-for-xdr" data-bi-cn="Microsoft Defender Experts for XDR" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3851" aria-label="Microsoft Defender Experts for XDR" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Defender Experts for XDR </span> <span class="custom-control-label__amt">(1)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3875" value="microsoft-defender-external-attack-surface-management" data-bi-cn="Microsoft Defender External Attack Surface Management" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3875" aria-label="Microsoft Defender External Attack Surface Management" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Defender External Attack Surface Management </span> <span class="custom-control-label__amt">(1)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3706" value="microsoft-intune" data-bi-cn="Microsoft Intune" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3706" aria-label="Microsoft Intune" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Intune </span> <span class="custom-control-label__amt">(1)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="products[]" id="term-3710" value="microsoft-purview" data-bi-cn="Microsoft Purview" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3710" aria-label="Microsoft Purview" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Microsoft Purview </span> <span class="custom-control-label__amt">(1)</span> </label> </div> </div> <button aria-controls="facet-products-expand-collapse" aria-expanded="false" class="btn btn-link btn-sm px-0 faceted-search__expand-link" data-button-expand data-target="#facet-products-expand-collapse" type="button" > + View all 22 </button> </div> </div> </fieldset> </div> <div class="form-filters__group py-4 border-top " data-facet data-id="taxonomy-bc5977d96a96140eccba6514a0c53308"> <fieldset class="form-group m-0"> <legend class="h6 mb-g"> Threat intelligence </legend> <div class="facet facet--list" id="taxonomy-bc5977d96a96140eccba6514a0c53308"> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="threat-intelligence[]" id="term-3727" value="attacker-techniques-tools-and-infrastructure" data-bi-cn="Attacker techniques, tools, and infrastructure" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3727" aria-label="Attacker techniques, tools, and infrastructure" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Attacker techniques, tools, and infrastructure </span> <span class="custom-control-label__amt">(123)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="threat-intelligence[]" id="term-3738" value="threat-actors" data-bi-cn="Threat actors" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3738" aria-label="Threat actors" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Threat actors </span> <span class="custom-control-label__amt">(98)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="threat-intelligence[]" id="term-3739" value="vulnerabilities-and-exploits" data-bi-cn="Vulnerabilities and exploits" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3739" aria-label="Vulnerabilities and exploits" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Vulnerabilities and exploits </span> <span class="custom-control-label__amt">(62)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="threat-intelligence[]" id="term-3735" value="ransomware" data-bi-cn="Ransomware" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3735" aria-label="Ransomware" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Ransomware </span> <span class="custom-control-label__amt">(45)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="threat-intelligence[]" id="term-3736" value="social-engineering-phishing" data-bi-cn="Social engineering / phishing" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3736" aria-label="Social engineering / phishing" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Social engineering / phishing </span> <span class="custom-control-label__amt">(40)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="threat-intelligence[]" id="term-3732" value="influence-operations" data-bi-cn="Influence operations" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3732" aria-label="Influence operations" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Influence operations </span> <span class="custom-control-label__amt">(26)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="threat-intelligence[]" id="term-3730" value="cybercrime" data-bi-cn="Cybercrime" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3730" aria-label="Cybercrime" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Cybercrime </span> <span class="custom-control-label__amt">(20)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="threat-intelligence[]" id="term-3729" value="cloud-threats" data-bi-cn="Cloud threats" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3729" aria-label="Cloud threats" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Cloud threats </span> <span class="custom-control-label__amt">(13)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="threat-intelligence[]" id="term-3737" value="supply-chain-attacks" data-bi-cn="Supply chain attacks" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3737" aria-label="Supply chain attacks" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Supply chain attacks </span> <span class="custom-control-label__amt">(10)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="threat-intelligence[]" id="term-3733" value="iot-ot-threats" data-bi-cn="IoT / OT threats" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3733" aria-label="IoT / OT threats" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> IoT / OT threats </span> <span class="custom-control-label__amt">(9)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="threat-intelligence[]" id="term-3728" value="business-email-compromise" data-bi-cn="Business email compromise" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3728" aria-label="Business email compromise" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Business email compromise </span> <span class="custom-control-label__amt">(8)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="threat-intelligence[]" id="term-3734" value="mobile-threats" data-bi-cn="Mobile threats" data-bi-ct="select filter" > <label class="custom-control-label" for="term-3734" aria-label="Mobile threats" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Mobile threats </span> <span class="custom-control-label__amt">(7)</span> </label> </div> <div class="custom-control custom-checkbox "> <input class="custom-control-input" type="checkbox" name="threat-intelligence[]" id="term-4237" value="ai-threats" data-bi-cn="AI threats" data-bi-ct="select filter" > <label class="custom-control-label" for="term-4237" aria-label="AI threats" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> AI threats </span> <span class="custom-control-label__amt">(5)</span> </label> </div> </div> </fieldset> </div> <div class="form-filters__group py-4 border-top " data-facet data-id="date-filter"> <fieldset class="form-group m-0"> <legend class="h6 mb-g"> Date </legend> <div class="facet facet--list" id="date-filter"> <div class="custom-control custom-radio "> <input class="custom-control-input" type="radio" name="date" id="date-any" value="any" checked='checked' data-bi-cn="All dates" data-bi-ct="select filter" > <label class="custom-control-label" for="date-any" aria-label="All dates" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> All dates </span> <span class="custom-control-label__amt">(345)</span> </label> </div> <div class="custom-control custom-radio "> <input class="custom-control-input" type="radio" name="date" id="date-30-days" value="30-days" data-bi-cn="Last 30 days" data-bi-ct="select filter" > <label class="custom-control-label" for="date-30-days" aria-label="Last 30 days" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Last 30 days </span> <span class="custom-control-label__amt">(6)</span> </label> </div> <div class="custom-control custom-radio "> <input class="custom-control-input" type="radio" name="date" id="date-90-days" value="90-days" data-bi-cn="Last 90 days" data-bi-ct="select filter" > <label class="custom-control-label" for="date-90-days" aria-label="Last 90 days" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Last 90 days </span> <span class="custom-control-label__amt">(11)</span> </label> </div> <div class="custom-control custom-radio "> <input class="custom-control-input" type="radio" name="date" id="date-6-months" value="6-months" data-bi-cn="Last 6 months" data-bi-ct="select filter" > <label class="custom-control-label" for="date-6-months" aria-label="Last 6 months" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Last 6 months </span> <span class="custom-control-label__amt">(20)</span> </label> </div> <div class="custom-control custom-radio "> <input class="custom-control-input" type="radio" name="date" id="date-12-months" value="12-months" data-bi-cn="Last 12 months" data-bi-ct="select filter" > <label class="custom-control-label" for="date-12-months" aria-label="Last 12 months" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Last 12 months </span> <span class="custom-control-label__amt">(36)</span> </label> </div> <div class="custom-control custom-radio "> <input class="custom-control-input" type="radio" name="date" id="date-custom-range" value="custom-range" data-bi-cn="Custom range" data-bi-ct="select filter" > <label class="custom-control-label" for="date-custom-range" aria-label="Custom range" > <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name"> Custom range </span> </label> </div> </div> </fieldset> </div> </div> </form> </div> </aside> </div> <div class="col col-12 col-lg-9"> <div class="faceted-search__results mb-5" id="search-results" role="region" aria-label="Search Results" aria-live="polite" aria-atomic="true" aria-busy="false" data-bi-an="Search Results" > <div class="search-results__posts posts-list" id="faceted-search-results"> <article id="post-136520" class="card material-card material-card--mobile h-100 is-entire-card-clickable post-136520 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-threat-intelligence threat-intelligence-ai-threats threat-intelligence-attacker-techniques-tools-and-infrastructure threat-intelligence-social-engineering-phishing threat-intelligence-threat-actors tag-sleet tag-storm review-flag-1694638265-576 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-4-1694638266-512 review-flag-5-1694638266-171 review-flag-6-1694638266-691 review-flag-7-1694638266-851 review-flag-exclu-1694638263-940 review-flag-new-1694638263-340"> <div class="card__image card-img card__image--medium pt-md-4 mt-md-3"> <div class="embed-responsive embed-responsive-16by9"> <img width="300" height="200" src="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Microsoft-at-CYBERWARCON-2024-300x200.webp" class="card-img embed-responsive-item img-object-cover wp-post-image" alt="Photo of business professionals in foyer walking, chatting, holding deivces" decoding="async" loading="lazy" srcset="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Microsoft-at-CYBERWARCON-2024-300x200.webp 300w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Microsoft-at-CYBERWARCON-2024-1024x684.webp 1024w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Microsoft-at-CYBERWARCON-2024-768x513.webp 768w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Microsoft-at-CYBERWARCON-2024.webp 1200w" sizes="(max-width: 300px) 100vw, 300px" /> </div> </div> <div class="card__content card-body p-4 p-md-0"> <div class="card__meta mb-g d-flex flex-wrap align-items-baseline"> <div class="card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0"> <ul class="list-unstyled d-flex flex-wrap m-0"> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/content-type/research/" data-bi-id="1" data-bi-cn="Research" data-bi-ct="post categories" data-bi-slot="1" > Research </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/topic/threat-intelligence/" data-bi-id="1" data-bi-cn="Threat intelligence" data-bi-ct="post categories" data-bi-slot="2" > Threat intelligence </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/products/microsoft-defender-threat-intelligence/" data-bi-id="1" data-bi-cn="Microsoft Defender Threat Intelligence" data-bi-ct="post categories" data-bi-slot="3" > Microsoft Defender Threat Intelligence </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/threat-intelligence/threat-actors/" data-bi-id="1" data-bi-cn="Threat actors" data-bi-ct="post categories" data-bi-slot="4" > Threat actors </a> </li> </ul></div> <div class="card__meta-group d-inline-flex"> <div class="card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small"> <span class="sr-only">Published</span> <time datetime="2024-11-22T03:00:00-08:00">Nov 22</time> </div> <div class="card__read-time d-sm-inline-flex align-items-center font-weight-bold small"> 10 min read </div> </div> </div> <h2 class="m-0 mb-g mb-lg-3 h3"> <a class="cta" data-bi-cn="Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON" data-bi-id="136520" data-bi-ct="title link" data-bi-tn="search-result-card" href="https://www.microsoft.com/en-us/security/blog/2024/11/22/microsoft-shares-latest-intelligence-on-north-korean-and-chinese-threat-actors-at-cyberwarcon/" > <span>Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON</span> <span class="glyph-prepend glyph-prepend-small glyph-prepend-chevron-right" aria-hidden="true"></span> </a> </h2> <p class="text-neutral-800"> At CYBERWARCON 2024, Microsoft Threat Intelligence analysts will share research and insights on North Korean and Chinese threat actors representing years of threat actor tracking, infrastructure monitoring and disruption, and their attack tooling. </p> </div> </article> <article id="post-136355" class="card material-card material-card--mobile h-100 is-entire-card-clickable post-136355 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-ai-and-machine-learning topic-data-security review-flag-1-1694638265-354 review-flag-integ-1694638263-281 review-flag-new-1694638263-340 review-flag-percent"> <div class="card__image card-img card__image--medium pt-md-4 mt-md-3"> <div class="embed-responsive embed-responsive-16by9"> <img width="300" height="200" src="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Security-ScannedImagery-Blue-Revised-300x200.jpg" class="card-img embed-responsive-item img-object-cover wp-post-image" alt="Close-up of a person typing on a laptop" decoding="async" loading="lazy" srcset="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Security-ScannedImagery-Blue-Revised-300x200.jpg 300w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Security-ScannedImagery-Blue-Revised-1024x683.jpg 1024w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Security-ScannedImagery-Blue-Revised-768x512.jpg 768w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Security-ScannedImagery-Blue-Revised-1536x1024.jpg 1536w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Security-ScannedImagery-Blue-Revised-2048x1365.jpg 2048w" sizes="(max-width: 300px) 100vw, 300px" /> </div> </div> <div class="card__content card-body p-4 p-md-0"> <div class="card__meta mb-g d-flex flex-wrap align-items-baseline"> <div class="card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0"> <ul class="list-unstyled d-flex flex-wrap m-0"> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/content-type/research/" data-bi-id="1" data-bi-cn="Research" data-bi-ct="post categories" data-bi-slot="1" > Research </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/topic/ai-and-machine-learning/" data-bi-id="1" data-bi-cn="AI and machine learning" data-bi-ct="post categories" data-bi-slot="2" > AI and machine learning </a> </li> </ul></div> <div class="card__meta-group d-inline-flex"> <div class="card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small"> <span class="sr-only">Published</span> <time datetime="2024-11-13T09:00:00-08:00">Nov 13</time> </div> <div class="card__read-time d-sm-inline-flex align-items-center font-weight-bold small"> 5 min read </div> </div> </div> <h2 class="m-0 mb-g mb-lg-3 h3"> <a class="cta" data-bi-cn="Microsoft Data Security Index annual report highlights evolving generative AI security needs" data-bi-id="136355" data-bi-ct="title link" data-bi-tn="search-result-card" href="https://www.microsoft.com/en-us/security/blog/2024/11/13/microsoft-data-security-index-annual-report-highlights-evolving-generative-ai-security-needs/" > <span>Microsoft Data Security Index annual report highlights evolving generative AI security needs</span> <span class="glyph-prepend glyph-prepend-small glyph-prepend-chevron-right" aria-hidden="true"></span> </a> </h2> <p class="text-neutral-800"> 84% of surveyed organizations want to feel more confident about managing and discovering data input into AI apps and tools. </p> </div> </article> <article id="post-136332" class="card material-card material-card--mobile h-100 is-entire-card-clickable post-136332 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-security-management topic-security-operations topic-zero-trust review-flag-5-1694638266-171 review-flag-dod-1694638267-531 review-flag-new-1694638263-340 review-flag-partn-1694638263-177 review-flag-unite-1694638267-167"> <div class="card__image card-img card__image--medium pt-md-4 mt-md-3"> <div class="embed-responsive embed-responsive-16by9"> <img width="300" height="186" src="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Security_386866_Blog_241108-300x186.webp" class="card-img embed-responsive-item img-object-cover wp-post-image" alt="Side profile of a woman wearing a dark shirt in a dim office scrolling or working on a Microsoft Surface Studio." decoding="async" loading="lazy" srcset="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Security_386866_Blog_241108-300x186.webp 300w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Security_386866_Blog_241108-1024x634.webp 1024w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Security_386866_Blog_241108-768x475.webp 768w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/11/Security_386866_Blog_241108.webp 1260w" sizes="(max-width: 300px) 100vw, 300px" /> </div> </div> <div class="card__content card-body p-4 p-md-0"> <div class="card__meta mb-g d-flex flex-wrap align-items-baseline"> <div class="card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0"> <ul class="list-unstyled d-flex flex-wrap m-0"> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/content-type/research/" data-bi-id="1" data-bi-cn="Research" data-bi-ct="post categories" data-bi-slot="1" > Research </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/topic/zero-trust/" data-bi-id="1" data-bi-cn="Zero Trust" data-bi-ct="post categories" data-bi-slot="2" > Zero Trust </a> </li> </ul></div> <div class="card__meta-group d-inline-flex"> <div class="card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small"> <span class="sr-only">Published</span> <time datetime="2024-11-11T09:00:00-08:00">Nov 11</time> </div> <div class="card__read-time d-sm-inline-flex align-items-center font-weight-bold small"> 4 min read </div> </div> </div> <h2 class="m-0 mb-g mb-lg-3 h3"> <a class="cta" data-bi-cn="DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration" data-bi-id="136332" data-bi-ct="title link" data-bi-tn="search-result-card" href="https://www.microsoft.com/en-us/security/blog/2024/11/11/dod-zero-trust-strategy-proves-security-benchmark-years-ahead-of-schedule-with-microsoft-collaboration/" > <span>DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration</span> <span class="glyph-prepend glyph-prepend-small glyph-prepend-chevron-right" aria-hidden="true"></span> </a> </h2> <p class="text-neutral-800"> The Navy implementation scored a 100 percent success rate, meeting DoD requirements on all 91 Target-Level activities tested. </p> </div> </article> <article id="post-136262" class="card material-card material-card--mobile h-100 is-entire-card-clickable post-136262 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-for-cloud-apps products-microsoft-defender-for-endpoint products-microsoft-defender-for-identity products-microsoft-defender-xdr products-microsoft-sentinel threat-intelligence-attacker-techniques-tools-and-infrastructure threat-intelligence-threat-actors tag-storm review-flag-1694638265-576 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-4-1694638266-512 review-flag-5-1694638266-171 review-flag-7-1694638266-851 review-flag-8-1694638266-352 review-flag-disable review-flag-new-1694638263-340 review-flag-percent"> <div class="card__image card-img card__image--medium pt-md-4 mt-md-3"> <div class="embed-responsive embed-responsive-16by9"> <img width="300" height="200" src="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/CLO20_Edgar_Norris_003-300x200.jpg" class="card-img embed-responsive-item img-object-cover wp-post-image" alt="Photo of lobby" decoding="async" loading="lazy" srcset="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/CLO20_Edgar_Norris_003-300x200.jpg 300w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/CLO20_Edgar_Norris_003-1024x683.jpg 1024w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/CLO20_Edgar_Norris_003-768x512.jpg 768w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/CLO20_Edgar_Norris_003-1536x1024.jpg 1536w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/CLO20_Edgar_Norris_003-2048x1365.jpg 2048w" sizes="(max-width: 300px) 100vw, 300px" /> </div> </div> <div class="card__content card-body p-4 p-md-0"> <div class="card__meta mb-g d-flex flex-wrap align-items-baseline"> <div class="card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0"> <ul class="list-unstyled d-flex flex-wrap m-0"> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/content-type/research/" data-bi-id="1" data-bi-cn="Research" data-bi-ct="post categories" data-bi-slot="1" > Research </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/topic/threat-intelligence/" data-bi-id="1" data-bi-cn="Threat intelligence" data-bi-ct="post categories" data-bi-slot="2" > Threat intelligence </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/products/microsoft-defender-xdr/" data-bi-id="1" data-bi-cn="Microsoft Defender XDR" data-bi-ct="post categories" data-bi-slot="3" > Microsoft Defender XDR </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/threat-intelligence/attacker-techniques-tools-and-infrastructure/" data-bi-id="1" data-bi-cn="Attacker techniques, tools, and infrastructure" data-bi-ct="post categories" data-bi-slot="4" > Attacker techniques, tools, and infrastructure </a> </li> </ul></div> <div class="card__meta-group d-inline-flex"> <div class="card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small"> <span class="sr-only">Published</span> <time datetime="2024-10-31T10:00:00-07:00">Oct 31</time> </div> <div class="card__read-time d-sm-inline-flex align-items-center font-weight-bold small"> 8 min read </div> </div> </div> <h2 class="m-0 mb-g mb-lg-3 h3"> <a class="cta" data-bi-cn="Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network" data-bi-id="136262" data-bi-ct="title link" data-bi-tn="search-result-card" href="https://www.microsoft.com/en-us/security/blog/2024/10/31/chinese-threat-actor-storm-0940-uses-credentials-from-password-spray-attacks-from-a-covert-network/" > <span>Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network</span> <span class="glyph-prepend glyph-prepend-small glyph-prepend-chevron-right" aria-hidden="true"></span> </a> </h2> <p class="text-neutral-800"> Since August 2023, Microsoft has observed intrusion activity targeting and successfully stealing credentials from multiple Microsoft customers that is enabled by highly evasive password spray attacks. Microsoft has linked the source of these password spray attacks to a network of compromised devices we track as CovertNetwork-1658, also known as xlogin and Quad7 (7777). </p> </div> </article> <article id="post-136153" class="card material-card material-card--mobile h-100 is-entire-card-clickable post-136153 post type-post status-publish format-standard has-post-thumbnail hentry content-type-industry-trends content-type-research topic-small-and-medium-business tag-security-strategies review-flag-1694638271-781 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-4-1694638266-512 review-flag-5-1694638266-171 review-flag-6-1694638266-691 review-flag-7-1694638266-851 review-flag-alway-1694638263-571 review-flag-anywh-1694638264-237 review-flag-new-1694638263-340"> <div class="card__image card-img card__image--medium pt-md-4 mt-md-3"> <div class="embed-responsive embed-responsive-16by9"> <img width="300" height="169" src="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Security_384075_Blog_241028-300x169.webp" class="card-img embed-responsive-item img-object-cover wp-post-image" alt="Practitioner and CISO collaboration in a security operations center." decoding="async" loading="lazy" srcset="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Security_384075_Blog_241028-300x169.webp 300w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Security_384075_Blog_241028-1024x575.webp 1024w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Security_384075_Blog_241028-768x432.webp 768w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Security_384075_Blog_241028-615x346.webp 615w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Security_384075_Blog_241028-336x189.webp 336w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Security_384075_Blog_241028-189x106.webp 189w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Security_384075_Blog_241028-630x354.webp 630w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Security_384075_Blog_241028.webp 1260w" sizes="(max-width: 300px) 100vw, 300px" /> </div> </div> <div class="card__content card-body p-4 p-md-0"> <div class="card__meta mb-g d-flex flex-wrap align-items-baseline"> <div class="card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0"> <ul class="list-unstyled d-flex flex-wrap m-0"> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/content-type/industry-trends/" data-bi-id="1" data-bi-cn="Industry trends" data-bi-ct="post categories" data-bi-slot="1" > Industry trends </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/topic/small-and-medium-business/" data-bi-id="1" data-bi-cn="Small and medium business" data-bi-ct="post categories" data-bi-slot="2" > Small and medium business </a> </li> </ul></div> <div class="card__meta-group d-inline-flex"> <div class="card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small"> <span class="sr-only">Published</span> <time datetime="2024-10-31T09:00:00-07:00">Oct 31</time> </div> <div class="card__read-time d-sm-inline-flex align-items-center font-weight-bold small"> 6 min read </div> </div> </div> <h2 class="m-0 mb-g mb-lg-3 h3"> <a class="cta" data-bi-cn="7 cybersecurity trends and tips for small and medium businesses to stay protected" data-bi-id="136153" data-bi-ct="title link" data-bi-tn="search-result-card" href="https://www.microsoft.com/en-us/security/blog/2024/10/31/7-cybersecurity-trends-and-tips-for-small-and-medium-businesses-to-stay-protected/" > <span>7 cybersecurity trends and tips for small and medium businesses to stay protected</span> <span class="glyph-prepend glyph-prepend-small glyph-prepend-chevron-right" aria-hidden="true"></span> </a> </h2> <p class="text-neutral-800"> The challenges that small and midsize businesses (SMBs) face when it comes to security continue to increase as it becomes more difficult to keep up with sophisticated cyberthreats with limited resources or security expertise. Research conducted highlights the top seven SMB cybersecurity trends and steps that can be taken to stay protected. </p> </div> </article> <article id="post-136186" class="card material-card material-card--mobile h-100 is-entire-card-clickable post-136186 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-for-endpoint products-microsoft-defender-threat-intelligence products-microsoft-defender-xdr products-microsoft-sentinel threat-intelligence-attacker-techniques-tools-and-infrastructure threat-intelligence-threat-actors tag-blizzard tag-midnight-blizzard-nobelium review-flag-1694638265-576 review-flag-1694638271-781 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-lever-1694638263-909 review-flag-machi-1694638272-641 review-flag-new-1694638263-340"> <div class="card__image card-img card__image--medium pt-md-4 mt-md-3"> <div class="embed-responsive embed-responsive-16by9"> <img width="300" height="169" src="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Screenshot-2024-10-31-at-12.13.59 PM-300x169.webp" class="card-img embed-responsive-item img-object-cover wp-post-image" alt="Midnight Blizzard icon" decoding="async" loading="lazy" srcset="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Screenshot-2024-10-31-at-12.13.59 PM-300x169.webp 300w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Screenshot-2024-10-31-at-12.13.59 PM-1024x577.webp 1024w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Screenshot-2024-10-31-at-12.13.59 PM-768x432.webp 768w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Screenshot-2024-10-31-at-12.13.59 PM-1536x865.webp 1536w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Screenshot-2024-10-31-at-12.13.59 PM-2048x1153.webp 2048w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Screenshot-2024-10-31-at-12.13.59 PM-615x346.webp 615w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Screenshot-2024-10-31-at-12.13.59 PM-336x189.webp 336w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Screenshot-2024-10-31-at-12.13.59 PM-189x106.webp 189w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/Screenshot-2024-10-31-at-12.13.59 PM-630x354.webp 630w" sizes="(max-width: 300px) 100vw, 300px" /> </div> </div> <div class="card__content card-body p-4 p-md-0"> <div class="card__meta mb-g d-flex flex-wrap align-items-baseline"> <div class="card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0"> <ul class="list-unstyled d-flex flex-wrap m-0"> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/content-type/research/" data-bi-id="1" data-bi-cn="Research" data-bi-ct="post categories" data-bi-slot="1" > Research </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/topic/threat-intelligence/" data-bi-id="1" data-bi-cn="Threat intelligence" data-bi-ct="post categories" data-bi-slot="2" > Threat intelligence </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/products/microsoft-defender-xdr/" data-bi-id="1" data-bi-cn="Microsoft Defender XDR" data-bi-ct="post categories" data-bi-slot="3" > Microsoft Defender XDR </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/threat-intelligence/threat-actors/" data-bi-id="1" data-bi-cn="Threat actors" data-bi-ct="post categories" data-bi-slot="4" > Threat actors </a> </li> </ul></div> <div class="card__meta-group d-inline-flex"> <div class="card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small"> <span class="sr-only">Published</span> <time datetime="2024-10-29T12:00:00-07:00">Oct 29</time> </div> <div class="card__read-time d-sm-inline-flex align-items-center font-weight-bold small"> 13 min read </div> </div> </div> <h2 class="m-0 mb-g mb-lg-3 h3"> <a class="cta" data-bi-cn="Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files" data-bi-id="136186" data-bi-ct="title link" data-bi-tn="search-result-card" href="https://www.microsoft.com/en-us/security/blog/2024/10/29/midnight-blizzard-conducts-large-scale-spear-phishing-campaign-using-rdp-files/" > <span>Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files</span> <span class="glyph-prepend glyph-prepend-small glyph-prepend-chevron-right" aria-hidden="true"></span> </a> </h2> <p class="text-neutral-800"> Since October 22, 2024, Microsoft Threat Intelligence has observed Russian threat actor Midnight Blizzard sending a series of highly targeted spear-phishing emails to individuals in government, academia, defense, non-governmental organizations, and other sectors. This activity is ongoing, and Microsoft will continue to investigate and provide updates as available. </p> </div> </article> <article id="post-136083" class="card material-card material-card--mobile h-100 is-entire-card-clickable post-136083 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-trends tag-ransomware review-flag-1694638271-781 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-4-1694638266-512 review-flag-5-1694638266-171 review-flag-6-1694638266-691 review-flag-8-1694638266-352 review-flag-new-1694638263-340"> <div class="card__image card-img card__image--medium pt-md-4 mt-md-3"> <div class="embed-responsive embed-responsive-16by9"> <img width="300" height="169" src="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-300x169.webp" class="card-img embed-responsive-item img-object-cover wp-post-image" alt="A group of healthcare workers look at a tablet." decoding="async" loading="lazy" srcset="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-300x169.webp 300w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-1024x576.webp 1024w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-768x432.webp 768w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-615x346.webp 615w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-336x189.webp 336w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-189x106.webp 189w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-630x354.webp 630w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report.webp 1260w" sizes="(max-width: 300px) 100vw, 300px" /> </div> </div> <div class="card__content card-body p-4 p-md-0"> <div class="card__meta mb-g d-flex flex-wrap align-items-baseline"> <div class="card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0"> <ul class="list-unstyled d-flex flex-wrap m-0"> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/content-type/research/" data-bi-id="1" data-bi-cn="Research" data-bi-ct="post categories" data-bi-slot="1" > Research </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/topic/threat-trends/" data-bi-id="1" data-bi-cn="Threat trends" data-bi-ct="post categories" data-bi-slot="2" > Threat trends </a> </li> </ul></div> <div class="card__meta-group d-inline-flex"> <div class="card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small"> <span class="sr-only">Published</span> <time datetime="2024-10-22T09:00:00-07:00">Oct 22</time> </div> <div class="card__read-time d-sm-inline-flex align-items-center font-weight-bold small"> 6 min read </div> </div> </div> <h2 class="m-0 mb-g mb-lg-3 h3"> <a class="cta" data-bi-cn="Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action" data-bi-id="136083" data-bi-ct="title link" data-bi-tn="search-result-card" href="https://www.microsoft.com/en-us/security/blog/2024/10/22/microsoft-threat-intelligence-healthcare-ransomware-report-highlights-need-for-collective-industry-action/" > <span>Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action</span> <span class="glyph-prepend glyph-prepend-small glyph-prepend-chevron-right" aria-hidden="true"></span> </a> </h2> <p class="text-neutral-800"> Healthcare organizations are an attractive target for ransomware attacks. Read our latest blog post to learn why and get strategies to protect yourself from cyberthreats. </p> </div> </article> <article id="post-136092" class="card material-card material-card--mobile h-100 is-entire-card-clickable post-136092 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-for-endpoint threat-intelligence-vulnerabilities-and-exploits tag-macos review-flag-1694638265-576 review-flag-1694638271-781 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-4-1694638266-512 review-flag-5-1694638266-171 review-flag-6-1694638266-691 review-flag-7-1694638266-851 review-flag-alway-1694638263-571 review-flag-machi-1694638272-641 review-flag-new-1694638263-340"> <div class="card__image card-img card__image--medium pt-md-4 mt-md-3"> <div class="embed-responsive embed-responsive-16by9"> <img width="300" height="200" src="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/macOS-vuln-300x200.webp" class="card-img embed-responsive-item img-object-cover wp-post-image" alt="Three professionals, a woman and two men, collaborating" decoding="async" loading="lazy" srcset="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/macOS-vuln-300x200.webp 300w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/macOS-vuln-768x512.webp 768w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/macOS-vuln.webp 1024w" sizes="(max-width: 300px) 100vw, 300px" /> </div> </div> <div class="card__content card-body p-4 p-md-0"> <div class="card__meta mb-g d-flex flex-wrap align-items-baseline"> <div class="card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0"> <ul class="list-unstyled d-flex flex-wrap m-0"> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/content-type/research/" data-bi-id="1" data-bi-cn="Research" data-bi-ct="post categories" data-bi-slot="1" > Research </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/topic/threat-intelligence/" data-bi-id="1" data-bi-cn="Threat intelligence" data-bi-ct="post categories" data-bi-slot="2" > Threat intelligence </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/products/microsoft-defender/" data-bi-id="1" data-bi-cn="Microsoft Defender" data-bi-ct="post categories" data-bi-slot="3" > Microsoft Defender </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/threat-intelligence/vulnerabilities-and-exploits/" data-bi-id="1" data-bi-cn="Vulnerabilities and exploits" data-bi-ct="post categories" data-bi-slot="4" > Vulnerabilities and exploits </a> </li> </ul></div> <div class="card__meta-group d-inline-flex"> <div class="card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small"> <span class="sr-only">Published</span> <time datetime="2024-10-17T09:00:00-07:00">Oct 17</time> </div> <div class="card__read-time d-sm-inline-flex align-items-center font-weight-bold small"> 9 min read </div> </div> </div> <h2 class="m-0 mb-g mb-lg-3 h3"> <a class="cta" data-bi-cn="New macOS vulnerability, “HM Surf”, could lead to unauthorized data access" data-bi-id="136092" data-bi-ct="title link" data-bi-tn="search-result-card" href="https://www.microsoft.com/en-us/security/blog/2024/10/17/new-macos-vulnerability-hm-surf-could-lead-to-unauthorized-data-access/" > <span>New macOS vulnerability, “HM Surf”, could lead to unauthorized data access</span> <span class="glyph-prepend glyph-prepend-small glyph-prepend-chevron-right" aria-hidden="true"></span> </a> </h2> <p class="text-neutral-800"> Microsoft Threat Intelligence uncovered a macOS vulnerability that could potentially allow an attacker to bypass the operating system’s Transparency, Consent, and Control (TCC) technology and gain unauthorized access to a user’s protected data. </p> </div> </article> <article id="post-135958" class="card material-card material-card--mobile h-100 is-entire-card-clickable post-135958 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-experts-for-hunting products-microsoft-defender-experts-for-xdr products-microsoft-defender-for-cloud-apps products-microsoft-defender-for-office-365 products-microsoft-defender-xdr products-microsoft-entra products-microsoft-entra-id-protection products-microsoft-security-experts products-microsoft-sentinel threat-intelligence-attacker-techniques-tools-and-infrastructure threat-intelligence-business-email-compromise threat-intelligence-cybercrime threat-intelligence-social-engineering-phishing tag-adversary-in-the-middle tag-credential-theft tag-token-theft review-flag-1694638265-576 review-flag-1694638271-781 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-4-1694638266-512 review-flag-5-1694638266-171 review-flag-6-1694638266-691 review-flag-and-o-1694638265-458 review-flag-lever-1694638263-909 review-flag-new-1694638263-340"> <div class="card__image card-img card__image--medium pt-md-4 mt-md-3"> <div class="embed-responsive embed-responsive-16by9"> <img width="300" height="200" src="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/blog3-300x200.jpg" class="card-img embed-responsive-item img-object-cover wp-post-image" alt="Man in coffee shop at laptop" decoding="async" loading="lazy" srcset="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/blog3-300x200.jpg 300w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/blog3-1024x682.jpg 1024w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/blog3-768x512.jpg 768w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/blog3-1536x1024.jpg 1536w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/10/blog3-2048x1365.jpg 2048w" sizes="(max-width: 300px) 100vw, 300px" /> </div> </div> <div class="card__content card-body p-4 p-md-0"> <div class="card__meta mb-g d-flex flex-wrap align-items-baseline"> <div class="card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0"> <ul class="list-unstyled d-flex flex-wrap m-0"> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/content-type/research/" data-bi-id="1" data-bi-cn="Research" data-bi-ct="post categories" data-bi-slot="1" > Research </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/topic/threat-intelligence/" data-bi-id="1" data-bi-cn="Threat intelligence" data-bi-ct="post categories" data-bi-slot="2" > Threat intelligence </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/products/microsoft-defender-xdr/" data-bi-id="1" data-bi-cn="Microsoft Defender XDR" data-bi-ct="post categories" data-bi-slot="3" > Microsoft Defender XDR </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/threat-intelligence/business-email-compromise/" data-bi-id="1" data-bi-cn="Business email compromise" data-bi-ct="post categories" data-bi-slot="4" > Business email compromise </a> </li> </ul></div> <div class="card__meta-group d-inline-flex"> <div class="card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small"> <span class="sr-only">Published</span> <time datetime="2024-10-08T09:00:00-07:00">Oct 8</time> </div> <div class="card__read-time d-sm-inline-flex align-items-center font-weight-bold small"> 9 min read </div> </div> </div> <h2 class="m-0 mb-g mb-lg-3 h3"> <a class="cta" data-bi-cn="File hosting services misused for identity phishing" data-bi-id="135958" data-bi-ct="title link" data-bi-tn="search-result-card" href="https://www.microsoft.com/en-us/security/blog/2024/10/08/file-hosting-services-misused-for-identity-phishing/" > <span>File hosting services misused for identity phishing</span> <span class="glyph-prepend glyph-prepend-small glyph-prepend-chevron-right" aria-hidden="true"></span> </a> </h2> <p class="text-neutral-800"> Since mid-April 2024, Microsoft has observed an increase in defense evasion tactics used in campaigns abusing file hosting services like SharePoint, OneDrive, and Dropbox. These campaigns use sophisticated techniques to perform social engineering, evade detection, and compromise identities, and include business email compromise (BEC) attacks. </p> </div> </article> <article id="post-135823" class="card material-card material-card--mobile h-100 is-entire-card-clickable post-135823 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-for-cloud-apps products-microsoft-defender-for-endpoint products-microsoft-defender-for-identity products-microsoft-defender-threat-intelligence products-microsoft-defender-vulnerability-management products-microsoft-defender-xdr products-microsoft-sentinel threat-intelligence-attacker-techniques-tools-and-infrastructure threat-intelligence-cloud-threats threat-intelligence-cybercrime threat-intelligence-ransomware threat-intelligence-threat-actors tag-credential-theft tag-ransomware tag-ransomware-as-a-service tag-storm review-flag-1694638265-576 review-flag-1694638265-83 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-alway-1694638263-571 review-flag-disable review-flag-disabled review-flag-infor-1694638272-144 review-flag-lever-1694638263-909 review-flag-new-1694638263-340 review-flag-partn-1694638263-177 review-flag-vm-1694638271-244"> <div class="card__image card-img card__image--medium pt-md-4 mt-md-3"> <div class="embed-responsive embed-responsive-16by9"> <img width="300" height="200" src="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/09/Storm-0501-300x200.webp" class="card-img embed-responsive-item img-object-cover wp-post-image" alt="Two engineers wearing safety goggles work on a desktop PC at a manufacturing plant." decoding="async" loading="lazy" srcset="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/09/Storm-0501-300x200.webp 300w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/09/Storm-0501-768x512.webp 768w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/09/Storm-0501.webp 864w" sizes="(max-width: 300px) 100vw, 300px" /> </div> </div> <div class="card__content card-body p-4 p-md-0"> <div class="card__meta mb-g d-flex flex-wrap align-items-baseline"> <div class="card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0"> <ul class="list-unstyled d-flex flex-wrap m-0"> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/content-type/research/" data-bi-id="1" data-bi-cn="Research" data-bi-ct="post categories" data-bi-slot="1" > Research </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/topic/threat-intelligence/" data-bi-id="1" data-bi-cn="Threat intelligence" data-bi-ct="post categories" data-bi-slot="2" > Threat intelligence </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/products/microsoft-defender/" data-bi-id="1" data-bi-cn="Microsoft Defender" data-bi-ct="post categories" data-bi-slot="3" > Microsoft Defender </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/threat-intelligence/attacker-techniques-tools-and-infrastructure/" data-bi-id="1" data-bi-cn="Attacker techniques, tools, and infrastructure" data-bi-ct="post categories" data-bi-slot="4" > Attacker techniques, tools, and infrastructure </a> </li> </ul></div> <div class="card__meta-group d-inline-flex"> <div class="card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small"> <span class="sr-only">Published</span> <time datetime="2024-09-26T10:00:00-07:00">Sep 26</time> </div> <div class="card__read-time d-sm-inline-flex align-items-center font-weight-bold small"> 20 min read </div> </div> </div> <h2 class="m-0 mb-g mb-lg-3 h3"> <a class="cta" data-bi-cn="Storm-0501: Ransomware attacks expanding to hybrid cloud environments" data-bi-id="135823" data-bi-ct="title link" data-bi-tn="search-result-card" href="https://www.microsoft.com/en-us/security/blog/2024/09/26/storm-0501-ransomware-attacks-expanding-to-hybrid-cloud-environments/" > <span>Storm-0501: Ransomware attacks expanding to hybrid cloud environments</span> <span class="glyph-prepend glyph-prepend-small glyph-prepend-chevron-right" aria-hidden="true"></span> </a> </h2> <p class="text-neutral-800"> Microsoft has observed the threat actor tracked as Storm-0501 launching a multi-staged attack where they compromised hybrid cloud environments and performed lateral movement from on-premises to cloud environment, leading to data exfiltration, credential theft, tampering, persistent backdoor access, and ransomware deployment. </p> </div> </article> <article id="post-135584" class="card material-card material-card--mobile h-100 is-entire-card-clickable post-135584 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-for-endpoint products-microsoft-defender-threat-intelligence products-microsoft-sentinel threat-intelligence-attacker-techniques-tools-and-infrastructure threat-intelligence-threat-actors threat-intelligence-vulnerabilities-and-exploits tag-sleet tag-state-sponsored-threat-actor review-flag-1694638265-576 review-flag-2-1694638266-864 review-flag-machi-1694638272-641 review-flag-new-1694638263-340"> <div class="card__image card-img card__image--medium pt-md-4 mt-md-3"> <div class="embed-responsive embed-responsive-16by9"> <img width="300" height="200" src="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/CitrineSleet-blog-n-300x200.webp" class="card-img embed-responsive-item img-object-cover wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/CitrineSleet-blog-n-300x200.webp 300w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/CitrineSleet-blog-n-1024x683.webp 1024w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/CitrineSleet-blog-n-768x512.webp 768w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/CitrineSleet-blog-n-1536x1024.webp 1536w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/CitrineSleet-blog-n.webp 1728w" sizes="(max-width: 300px) 100vw, 300px" /> </div> </div> <div class="card__content card-body p-4 p-md-0"> <div class="card__meta mb-g d-flex flex-wrap align-items-baseline"> <div class="card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0"> <ul class="list-unstyled d-flex flex-wrap m-0"> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/content-type/research/" data-bi-id="1" data-bi-cn="Research" data-bi-ct="post categories" data-bi-slot="1" > Research </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/topic/threat-intelligence/" data-bi-id="1" data-bi-cn="Threat intelligence" data-bi-ct="post categories" data-bi-slot="2" > Threat intelligence </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/products/microsoft-defender/" data-bi-id="1" data-bi-cn="Microsoft Defender" data-bi-ct="post categories" data-bi-slot="3" > Microsoft Defender </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/threat-intelligence/vulnerabilities-and-exploits/" data-bi-id="1" data-bi-cn="Vulnerabilities and exploits" data-bi-ct="post categories" data-bi-slot="4" > Vulnerabilities and exploits </a> </li> </ul></div> <div class="card__meta-group d-inline-flex"> <div class="card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small"> <span class="sr-only">Published</span> <time datetime="2024-08-30T09:00:00-07:00">Aug 30</time> </div> <div class="card__read-time d-sm-inline-flex align-items-center font-weight-bold small"> 9 min read </div> </div> </div> <h2 class="m-0 mb-g mb-lg-3 h3"> <a class="cta" data-bi-cn="North Korean threat actor Citrine Sleet exploiting Chromium zero-day" data-bi-id="135584" data-bi-ct="title link" data-bi-tn="search-result-card" href="https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/" > <span>North Korean threat actor Citrine Sleet exploiting Chromium zero-day</span> <span class="glyph-prepend glyph-prepend-small glyph-prepend-chevron-right" aria-hidden="true"></span> </a> </h2> <p class="text-neutral-800"> Microsoft identified a North Korean threat actor exploiting a zero-day vulnerability in Chromium (CVE-2024-7971) to gain remote code execution (RCE) in the Chromium renderer process. Our assessment of ongoing analysis and observed infrastructure attributes this activity to Citrine Sleet, a North Korean threat actor that commonly targets the cryptocurrency sector for financial gain. </p> </div> </article> <article id="post-135563" class="card material-card material-card--mobile h-100 is-entire-card-clickable post-135563 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-for-cloud-apps products-microsoft-defender-for-endpoint products-microsoft-defender-for-identity products-microsoft-defender-xdr products-microsoft-sentinel threat-intelligence-attacker-techniques-tools-and-infrastructure threat-intelligence-threat-actors tag-sandstorm tag-state-sponsored-threat-actor review-flag-1694638265-576 review-flag-1694638265-310 review-flag-1694638265-83 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-5-1694638266-171 review-flag-alway-1694638263-571 review-flag-lever-1694638263-909 review-flag-new-1694638263-340"> <div class="card__image card-img card__image--medium pt-md-4 mt-md-3"> <div class="embed-responsive embed-responsive-16by9"> <img width="300" height="169" src="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/Hexagon-overlay-300x169.webp" class="card-img embed-responsive-item img-object-cover wp-post-image" alt="A photo of a male standing in front of a computer" decoding="async" loading="lazy" srcset="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/Hexagon-overlay-300x169.webp 300w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/Hexagon-overlay-1024x576.webp 1024w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/Hexagon-overlay-768x432.webp 768w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/Hexagon-overlay-1536x864.webp 1536w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/Hexagon-overlay-2048x1151.webp 2048w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/Hexagon-overlay-615x346.webp 615w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/Hexagon-overlay-336x189.webp 336w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/Hexagon-overlay-189x106.webp 189w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2024/08/Hexagon-overlay-630x354.webp 630w" sizes="(max-width: 300px) 100vw, 300px" /> </div> </div> <div class="card__content card-body p-4 p-md-0"> <div class="card__meta mb-g d-flex flex-wrap align-items-baseline"> <div class="card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0"> <ul class="list-unstyled d-flex flex-wrap m-0"> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/content-type/research/" data-bi-id="1" data-bi-cn="Research" data-bi-ct="post categories" data-bi-slot="1" > Research </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/topic/threat-intelligence/" data-bi-id="1" data-bi-cn="Threat intelligence" data-bi-ct="post categories" data-bi-slot="2" > Threat intelligence </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/products/microsoft-defender-xdr/" data-bi-id="1" data-bi-cn="Microsoft Defender XDR" data-bi-ct="post categories" data-bi-slot="3" > Microsoft Defender XDR </a> </li> <li> <a class="font-weight-bold small" href="https://www.microsoft.com/en-us/security/blog/threat-intelligence/threat-actors/" data-bi-id="1" data-bi-cn="Threat actors" data-bi-ct="post categories" data-bi-slot="4" > Threat actors </a> </li> </ul></div> <div class="card__meta-group d-inline-flex"> <div class="card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small"> <span class="sr-only">Published</span> <time datetime="2024-08-28T08:00:00-07:00">Aug 28</time> </div> <div class="card__read-time d-sm-inline-flex align-items-center font-weight-bold small"> 14 min read </div> </div> </div> <h2 class="m-0 mb-g mb-lg-3 h3"> <a class="cta" data-bi-cn="Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations" data-bi-id="135563" data-bi-ct="title link" data-bi-tn="search-result-card" href="https://www.microsoft.com/en-us/security/blog/2024/08/28/peach-sandstorm-deploys-new-custom-tickler-malware-in-long-running-intelligence-gathering-operations/" > <span>Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations</span> <span class="glyph-prepend glyph-prepend-small glyph-prepend-chevron-right" aria-hidden="true"></span> </a> </h2> <p class="text-neutral-800"> Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which we named Tickler. </p> </div> </article> </div> <div class="d-flex justify-content-center"> <button type="button" data-load-more-button aria-controls="faceted-search-results" aria-label="Load more results" class="btn btn-primary faceted-search__load-more mt-4" > Load more </button> </div> </div> <div class="faceted-search__pagination"> <ul class='pagination nav-links'><li class="page-item disabled"><span class="prev page-link">Previous</span></li> <li class="page-item active" aria-current="page"><a class="page-link"><span>1</span></a></li> <li class="page-item"><a class="page-link" href="https://www.microsoft.com/en-us/security/blog/content-type/research/page/2/">2</a></li> <li class="page-item"><a class="page-link" href="https://www.microsoft.com/en-us/security/blog/content-type/research/page/3/">3</a></li> <li class="page-item disabled ellipsis"><span class="page-link text-body">…</span></li> <li class="page-item"><a class="page-link" href="https://www.microsoft.com/en-us/security/blog/content-type/research/page/29/">29</a></li> <li class="page-item"><a class="next page-link" href="https://www.microsoft.com/en-us/security/blog/content-type/research/page/2/">Next</a></li></ul> </div> </div> </div> </div> </div> <template id="current-selection-template"> <li class="pb-2"> <button type="button" class="btn btn-sm glyph-append glyph-append-xsmall glyph-append-cancel font-weight-normal py-2 current-selections__selection bg-gray-100 dark-bg-black text-body dark-border-gray-700 rounded-sm" aria-label="Remove filter" data-bi-an="Current Selections" data-bi-ct="filter removal" data-bi-bhvr="5" ></button> </li> </template> <template id="skeleton-template"> <div class="border-top py-4"> <div class="card card--skeleton"> <div class="faceted-search__skeleton faceted-search__skeleton--is-loading small mb-3 w-25" style="--skeleton-lines: 1;"> </div> <div class="faceted-search__skeleton faceted-search__skeleton--is-loading h3 mt-0 mb-2 w-100" style="--skeleton-lines: 2;"> </div> <div class="faceted-search__skeleton faceted-search__skeleton--is-loading base mt-0 mb-2 w-50" style="--skeleton-lines: 1;"> </div> <div class="faceted-search__skeleton faceted-search__skeleton--is-loading base mt-0 mb-3 w-25" style="--skeleton-lines: 1;"> </div> <div class="faceted-search__skeleton faceted-search__skeleton--is-loading base mt-0 w-100" style="--skeleton-lines: 2;"> </div> </div> </div> </template> <template id="autocomplete-template"> <label for="js-replaceable-autocomplete-id" class="small"> Search all 0 Terms </label> <div class="facet__autocomplete--input" data-type="js-replaceable-facet-id" id="js-replaceable-facet-id-autocomplete" ></div> </template> <template id="facet-toggle-template"> <div class="facet__expand-collapse"> <div id="js-replaceable-facet-expand-collapse-id" aria-hidden="true" class="collapse" role="region" ></div> <button aria-controls="js-replaceable-facet-expand-collapse-id" aria-expanded="false" class="btn btn-link btn-sm px-0 faceted-search__expand-link" data-button-expand data-target="#js-replaceable-facet-expand-collapse-id" type="button" > + View all 10 </button> </div> </template> <template id="facet-input-template"> <input class="custom-control-input" data-bi-cn="News" data-bi-ct="select filter" data-input id="js-replaceable-term-id" name="js-replaceable-type[]" type="checkbox" value="news" > <label class="custom-control-label" for="js-replaceable-term-id" aria-label="News" data-label> <span class="custom-control-glyph" aria-hidden="true"></span> <span class="custom-control-label__name" data-name>News</span> <span data-amount>(9)</span> </label> </template> <template id="facet-item-collapse-template"> <div class="d-flex w-100 text-neutral-600"> <div data-input-template></div> <button type="button" class="btn btn-collapse" aria-expanded="false" aria-label="Expand this term to show child terms" data-mount="collapse" data-target="#js-replaceable-collapse-id" > <span class="glyph" aria-hidden="true"></span> </button> </div> <div class="my-2 collapse" id="js-replaceable-collapse-id"></div> </template> <template id="facet-item-template"> <div class="custom-control custom-checkbox"> <div data-input-template></div> </div> </template> </main> <aside aria-label="Learn more and connect with us"> <div class="container"> <section class="pt-5" data-bi-an="Global CTA"> <div class="card-offset mx-ng mx-md-0"> <div class="row no-gutters material-surface material-color-brand-dark"> <div class="d-flex col-md"> <div class="card-body align-self-center"> <h2 id="global-cta-heading">Get started with Microsoft Security</h2> <div class="mb-3"> <p>Microsoft is a leader in cybersecurity, and we embrace our responsibility to make the world a safer place.</p> </div> <div class="link-group"> <a aria-labelledby="global-cta-heading" data-bi-cn="Learn more" data-bi-ct="cta link" data-bi-id="global-cta-link" href="https://www.microsoft.com/en-us/security?wt.mc_id=AID730391_QSG_BLOG_319247&ocid=AID730391_QSG_BLOG_319247" class="btn btn-inverted-primary text-black" > Learn more </a> </div> </div> </div> <div class="col-md-6"> <div class="card-img rounded-top-right"> <picture> <img width="900" height="360" src="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2021/06/Security_Blog-banner_900x360.png" class="embed-responsive-item img-object-cover" alt="Banner that reads "protect it all with Microsoft Security"" decoding="async" loading="lazy" srcset="https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2021/06/Security_Blog-banner_900x360.png 900w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2021/06/Security_Blog-banner_900x360-300x120.png 300w, https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2021/06/Security_Blog-banner_900x360-768x307.png 768w" sizes="(max-width: 900px) 100vw, 900px" /> </picture> </div> </div> </div> </div> </section> <section class="footer-social py-4 text-center" role="region" aria-label="social media links" data-bi-an="Global CTA Social"> <h2 class="base font-weight-normal align-middle mr-3 mt-0 mb-3 mb-sm-0 d-sm-inline"> Connect with us on social </h2> <ul class="list-inline mb-0 d-inline-flex align-middle"> <li class="list-inline-item mr-3"> <a class="d-flex text-body" aria-label="Follow on X" data-bi-cn="Follow on X" data-bi-id="social-x-link" data-bi-ct="follow link" data-bi-bhvr="126" href="https://twitter.com/msftsecurity" target="_blank" > <span class="svg" aria-hidden="true"> <svg xmlns="http://www.w3.org/2000/svg" width="29" height="29" fill="none" viewBox="0 0 29 29"><g><path fill="currentColor" d="M17.259 12.273 28.055 0h-2.558l-9.375 10.657L8.635 0H0l11.322 16.115L0 28.985h2.558l9.9-11.254 7.907 11.254H29zm-3.504 3.984-1.147-1.605L3.48 1.884h3.93l7.366 10.304 1.147 1.605 9.575 13.394h-3.93z" /></g><defs><path fill="currentColor" d="M0 0h29v29H0z" /></defs></svg> </span> </a> </li> <li class="list-inline-item mr-3"> <a aria-label="Follow on YouTube" data-bi-cn="Follow on YouTube" data-bi-ct="follow link" data-bi-id="social-youtube-link" data-bi-bhvr="126" href="https://www.youtube.com/channel/UC4s3tv0Qq_OSUBfR735Jc6A" target="_blank" > <span class="svg" aria-hidden="true"> <svg xmlns="http://www.w3.org/2000/svg" width="42" height="29" fill="none" viewBox="0 0 42 29"><path fill="red" fill-rule="evenodd" d="M39.253 2.206a5.2 5.2 0 0 1 1.35 2.325c.846 3.23.863 9.976.863 9.976s0 6.745-.863 9.976a5.2 5.2 0 0 1-3.681 3.65C33.69 29 20.726 29 20.726 29s-12.961 0-16.192-.853A5.19 5.19 0 0 1 .87 24.483c-.867-3.231-.867-9.976-.867-9.976s0-6.745.867-9.976A5.19 5.19 0 0 1 4.534.867C7.762 0 20.726 0 20.726 0s12.962 0 16.196.867a5.2 5.2 0 0 1 2.331 1.339m-11.901 12.3L16.58 20.724V8.291l10.77 6.216Z" /></svg> </span> </a> </li> <li class="list-inline-item mr-3"> <a class="d-flex" aria-label="Follow on LinkedIn" data-bi-cn="Follow on LinkedIn" data-bi-ct="follow link" data-bi-id="social-linkedin-link" data-bi-bhvr="126" href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank" > <span class="svg" aria-hidden="true"> <svg xmlns="http://www.w3.org/2000/svg" width="30" height="29" fill="none" viewBox="0 0 30 29"><path fill="#0A66C1" d="M25.011 24.711h-4.203v-6.744c0-1.59-.047-3.66-2.172-3.66-2.172 0-2.55 1.734-2.55 3.564v6.84h-4.203V10.886h4.014v1.879h.047a4.31 4.31 0 0 1 4.014-2.216c4.25 0 5.053 2.89 5.053 6.6zM7.114 9.008c-1.37 0-2.456-1.108-2.456-2.505s1.087-2.505 2.456-2.505c1.37 0 2.455 1.108 2.455 2.505S8.483 9.008 7.114 9.008M9.239 24.71h-4.25V10.886h4.203v13.825zM27.136 0H2.864A2.076 2.076 0 0 0 .786 2.071v24.856c0 1.156.945 2.12 2.078 2.071h24.225c1.133 0 2.078-.915 2.125-2.071V2.071A2.076 2.076 0 0 0 27.136 0" /></svg> </span> </a> </li> </ul> </section> </div> </aside> <div id="footerArea" class="uhf" data-m='{"cN":"footerArea","cT":"Area_coreuiArea","id":"a2Body","sN":2,"aN":"Body"}'> <div id="footerRegion" data-region-key="footerregion" data-m='{"cN":"footerRegion","cT":"Region_coreui-region","id":"r1a2","sN":1,"aN":"a2"}' > <div id="footerUniversalFooter" data-m='{"cN":"footerUniversalFooter","cT":"Module_coreui-universalfooter","id":"m1r1a2","sN":1,"aN":"r1a2"}' data-module-id="Category|footerRegion|coreui-region|footerUniversalFooter|coreui-universalfooter"> <footer id="uhf-footer" class="c-uhff context-uhf" data-uhf-mscc-rq="false" data-footer-footprint="/MSSecurity/MSSecurityFooter, fromService: True" data-m='{"cN":"Uhf footer_cont","cT":"Container","id":"c1m1r1a2","sN":1,"aN":"m1r1a2"}'> <nav class="c-uhff-nav" aria-label="Footer Resource links" data-m='{"cN":"Footer nav_cont","cT":"Container","id":"c1c1m1r1a2","sN":1,"aN":"c1m1r1a2"}'> <div class="c-uhff-nav-row"> <div class="c-uhff-nav-group" data-m='{"cN":"footerNavColumn1_cont","cT":"Container","id":"c1c1c1m1r1a2","sN":1,"aN":"c1c1m1r1a2"}'> <div class="c-heading-4" role="heading" aria-level="2">What's new</div> <ul class="c-list f-bare"> <li> <a aria-label="Surface Pro What's new" class="c-uhff-link" href="https://www.microsoft.com/en-us/surface/devices/surface-pro-11th-edition" data-m='{"cN":"Footer_WhatsNew_NewSurfacePro_nav","id":"n1c1c1c1m1r1a2","sN":1,"aN":"c1c1c1m1r1a2"}'>Surface Pro</a> </li> <li> <a aria-label="Surface Laptop What's new" class="c-uhff-link" href="https://www.microsoft.com/en-us/surface/devices/surface-laptop-7th-edition" data-m='{"cN":"Footer_WhatsNew_SurfaceLaptop_nav","id":"n2c1c1c1m1r1a2","sN":2,"aN":"c1c1c1m1r1a2"}'>Surface Laptop</a> </li> <li> <a aria-label="Surface Laptop Studio 2 What's new" class="c-uhff-link" href="https://www.microsoft.com/en-us/d/Surface-Laptop-Studio-2/8rqr54krf1dz" data-m='{"cN":"Footer_WhatsNew_SurfaceLaptopStudio2_nav","id":"n3c1c1c1m1r1a2","sN":3,"aN":"c1c1c1m1r1a2"}'>Surface Laptop Studio 2</a> </li> <li> <a aria-label="Surface Laptop Go 3 What's new" class="c-uhff-link" href="https://www.microsoft.com/en-us/d/Surface-Laptop-Go-3/8p0wwgj6c6l2" data-m='{"cN":"Footer_WhatsNew_SurfaceLaptopGo3_nav","id":"n4c1c1c1m1r1a2","sN":4,"aN":"c1c1c1m1r1a2"}'>Surface Laptop Go 3</a> </li> <li> <a aria-label="Microsoft Copilot What's new" class="c-uhff-link" href="https://www.microsoft.com/en-us/microsoft-copilot" data-m='{"cN":"Footer_WhatsNew_CopilotMicrosoft_nav","id":"n5c1c1c1m1r1a2","sN":5,"aN":"c1c1c1m1r1a2"}'>Microsoft Copilot</a> </li> <li> <a aria-label="AI in Windows What's new" class="c-uhff-link" href="https://www.microsoft.com/en-us/windows/copilot-ai-features" data-m='{"cN":"Whatsnew_AIinWindows_nav","id":"n6c1c1c1m1r1a2","sN":6,"aN":"c1c1c1m1r1a2"}'>AI in Windows</a> </li> <li> <a aria-label="Explore Microsoft products What's new" class="c-uhff-link" href="https://www.microsoft.com/en-us/microsoft-products-and-apps" data-m='{"cN":"Footer_WhatsNew_ExploreMicrosoftProducts_nav","id":"n7c1c1c1m1r1a2","sN":7,"aN":"c1c1c1m1r1a2"}'>Explore Microsoft products</a> </li> <li> <a aria-label="Windows 11 apps What's new" class="c-uhff-link" href="https://www.microsoft.com/windows/windows-11-apps" data-m='{"cN":"Footer_WhatsNew_Windows_11_apps_nav","id":"n8c1c1c1m1r1a2","sN":8,"aN":"c1c1c1m1r1a2"}'>Windows 11 apps</a> </li> </ul> </div> <div class="c-uhff-nav-group" data-m='{"cN":"footerNavColumn2_cont","cT":"Container","id":"c2c1c1m1r1a2","sN":2,"aN":"c1c1m1r1a2"}'> <div class="c-heading-4" role="heading" aria-level="2">Microsoft Store</div> <ul class="c-list f-bare"> <li> <a aria-label="Account profile Microsoft Store" class="c-uhff-link" href="https://account.microsoft.com/" data-m='{"cN":"Footer_StoreandSupport_AccountProfile_nav","id":"n1c2c1c1m1r1a2","sN":1,"aN":"c2c1c1m1r1a2"}'>Account profile</a> </li> <li> <a aria-label="Download Center Microsoft Store" class="c-uhff-link" href="https://www.microsoft.com/en-us/download" data-m='{"cN":"Footer_StoreandSupport_DownloadCenter_nav","id":"n2c2c1c1m1r1a2","sN":2,"aN":"c2c1c1m1r1a2"}'>Download Center</a> </li> <li> <a aria-label="Microsoft Store support Microsoft Store" class="c-uhff-link" href="https://go.microsoft.com/fwlink/?linkid=2139749" data-m='{"cN":"Footer_StoreandSupport_SalesAndSupport_nav","id":"n3c2c1c1m1r1a2","sN":3,"aN":"c2c1c1m1r1a2"}'>Microsoft Store support</a> </li> <li> <a aria-label="Returns Microsoft Store" class="c-uhff-link" href="https://www.microsoft.com/en-us/store/b/returns" data-m='{"cN":"Footer_StoreandSupport_Returns_nav","id":"n4c2c1c1m1r1a2","sN":4,"aN":"c2c1c1m1r1a2"}'>Returns</a> </li> <li> <a aria-label="Order tracking Microsoft Store" class="c-uhff-link" href="https://www.microsoft.com/en-us/store/b/order-tracking" data-m='{"cN":"Footer_StoreandSupport_OrderTracking_nav","id":"n5c2c1c1m1r1a2","sN":5,"aN":"c2c1c1m1r1a2"}'>Order tracking</a> </li> <li> <a aria-label="Certified Refurbished Microsoft Store" class="c-uhff-link" href="https://www.microsoft.com/en-us/store/b/certified-refurbished-products" data-m='{"cN":"Footer_StoreandSupport_StoreLocations_nav","id":"n6c2c1c1m1r1a2","sN":6,"aN":"c2c1c1m1r1a2"}'>Certified Refurbished</a> </li> <li> <a aria-label="Microsoft Store Promise Microsoft Store" class="c-uhff-link" href="https://www.microsoft.com/en-us/store/b/why-microsoft-store?icid=footer_why-msft-store_7102020" data-m='{"cN":"Footer_StoreandSupport_MicrosoftPromise_nav","id":"n7c2c1c1m1r1a2","sN":7,"aN":"c2c1c1m1r1a2"}'>Microsoft Store Promise</a> </li> <li> <a aria-label="Flexible Payments Microsoft Store" class="c-uhff-link" href="https://www.microsoft.com/en-us/store/b/payment-financing-options?icid=footer_financing_vcc" data-m='{"cN":"Footer_StoreandSupport_Financing_nav","id":"n8c2c1c1m1r1a2","sN":8,"aN":"c2c1c1m1r1a2"}'>Flexible Payments</a> </li> </ul> </div> <div class="c-uhff-nav-group" data-m='{"cN":"footerNavColumn3_cont","cT":"Container","id":"c3c1c1m1r1a2","sN":3,"aN":"c1c1m1r1a2"}'> <div class="c-heading-4" role="heading" aria-level="2">Education</div> <ul class="c-list f-bare"> <li> <a aria-label="Microsoft in education Education" class="c-uhff-link" href="https://www.microsoft.com/en-us/education" data-m='{"cN":"Footer_Education_MicrosoftInEducation_nav","id":"n1c3c1c1m1r1a2","sN":1,"aN":"c3c1c1m1r1a2"}'>Microsoft in education</a> </li> <li> <a aria-label="Devices for education Education" class="c-uhff-link" href="https://www.microsoft.com/en-us/education/devices/overview" data-m='{"cN":"Footer_Education_DevicesforEducation_nav","id":"n2c3c1c1m1r1a2","sN":2,"aN":"c3c1c1m1r1a2"}'>Devices for education</a> </li> <li> <a aria-label="Microsoft Teams for Education Education" class="c-uhff-link" href="https://www.microsoft.com/en-us/education/products/teams" data-m='{"cN":"Footer_Education_MicrosoftTeamsforEducation_nav","id":"n3c3c1c1m1r1a2","sN":3,"aN":"c3c1c1m1r1a2"}'>Microsoft Teams for Education</a> </li> <li> <a aria-label="Microsoft 365 Education Education" class="c-uhff-link" href="https://www.microsoft.com/en-us/education/products/microsoft-365" data-m='{"cN":"Footer_Education_Microsoft365Education_nav","id":"n4c3c1c1m1r1a2","sN":4,"aN":"c3c1c1m1r1a2"}'>Microsoft 365 Education</a> </li> <li> <a aria-label="How to buy for your school Education" class="c-uhff-link" href="https://www.microsoft.com/education/how-to-buy" data-m='{"cN":"Footer_Howtobuyforyourschool_nav","id":"n5c3c1c1m1r1a2","sN":5,"aN":"c3c1c1m1r1a2"}'>How to buy for your school</a> </li> <li> <a aria-label="Educator training and development Education" class="c-uhff-link" href="https://education.microsoft.com/" data-m='{"cN":"Footer_Education_EducatorTrainingDevelopment_nav","id":"n6c3c1c1m1r1a2","sN":6,"aN":"c3c1c1m1r1a2"}'>Educator training and development</a> </li> <li> <a aria-label="Deals for students and parents Education" class="c-uhff-link" href="https://www.microsoft.com/en-us/store/b/education" data-m='{"cN":"Footer_Education_DealsForStudentsandParents_nav","id":"n7c3c1c1m1r1a2","sN":7,"aN":"c3c1c1m1r1a2"}'>Deals for students and parents</a> </li> <li> <a aria-label="Azure for students Education" class="c-uhff-link" href="https://azure.microsoft.com/en-us/free/students/" data-m='{"cN":"Footer_Education_Azureforstudents_nav","id":"n8c3c1c1m1r1a2","sN":8,"aN":"c3c1c1m1r1a2"}'>Azure for students</a> </li> </ul> </div> </div> <div class="c-uhff-nav-row"> <div class="c-uhff-nav-group" data-m='{"cN":"footerNavColumn4_cont","cT":"Container","id":"c4c1c1m1r1a2","sN":4,"aN":"c1c1m1r1a2"}'> <div class="c-heading-4" role="heading" aria-level="2">Business</div> <ul class="c-list f-bare"> <li> <a aria-label="Microsoft Cloud Business" class="c-uhff-link" href="https://www.microsoft.com/en-us/microsoft-cloud" data-m='{"cN":"Footer_Business_Microsoft_Cloud_nav","id":"n1c4c1c1m1r1a2","sN":1,"aN":"c4c1c1m1r1a2"}'>Microsoft Cloud</a> </li> <li> <a aria-label="Microsoft Security Business" class="c-uhff-link" href="https://www.microsoft.com/en-us/security" data-m='{"cN":"Footer_Business_Microsoft Security_nav","id":"n2c4c1c1m1r1a2","sN":2,"aN":"c4c1c1m1r1a2"}'>Microsoft Security</a> </li> <li> <a aria-label="Dynamics 365 Business" class="c-uhff-link" href="https://www.microsoft.com/en-us/dynamics-365" data-m='{"cN":"Footer_Business_MicrosoftDynamics365_nav","id":"n3c4c1c1m1r1a2","sN":3,"aN":"c4c1c1m1r1a2"}'>Dynamics 365</a> </li> <li> <a aria-label="Microsoft 365 Business" class="c-uhff-link" href="https://www.microsoft.com/en-us/microsoft-365/business" data-m='{"cN":"Footer_Business_M365_nav","id":"n4c4c1c1m1r1a2","sN":4,"aN":"c4c1c1m1r1a2"}'>Microsoft 365</a> </li> <li> <a aria-label="Microsoft Power Platform Business" class="c-uhff-link" href="https://www.microsoft.com/en-us/power-platform" data-m='{"cN":"Footer_DeveloperAndIT_Power Platform_nav","id":"n5c4c1c1m1r1a2","sN":5,"aN":"c4c1c1m1r1a2"}'>Microsoft Power Platform</a> </li> <li> <a aria-label="Microsoft Teams Business" class="c-uhff-link" href="https://www.microsoft.com/en-us/microsoft-teams/group-chat-software" data-m='{"cN":"Footer_Business_Microsoft365_nav","id":"n6c4c1c1m1r1a2","sN":6,"aN":"c4c1c1m1r1a2"}'>Microsoft Teams</a> </li> <li> <a aria-label="Microsoft 365 Copilot Business" class="c-uhff-link" href="https://www.microsoft.com/en-us/microsoft-365/copilot/copilot-for-work" data-m='{"cN":"Footer_CopilotMicrosoft365_nav","id":"n7c4c1c1m1r1a2","sN":7,"aN":"c4c1c1m1r1a2"}'>Microsoft 365 Copilot</a> </li> <li> <a aria-label="Small Business Business" class="c-uhff-link" href="https://www.microsoft.com/en-us/store/b/business?icid=CNavBusinessStore" data-m='{"cN":"Footer_Business-SmallBusiness_nav","id":"n8c4c1c1m1r1a2","sN":8,"aN":"c4c1c1m1r1a2"}'>Small Business</a> </li> </ul> </div> <div class="c-uhff-nav-group" data-m='{"cN":"footerNavColumn5_cont","cT":"Container","id":"c5c1c1m1r1a2","sN":5,"aN":"c1c1m1r1a2"}'> <div class="c-heading-4" role="heading" aria-level="2">Developer & IT</div> <ul class="c-list f-bare"> <li> <a aria-label="Azure Developer & IT" class="c-uhff-link" href="https://azure.microsoft.com/en-us/" data-m='{"cN":"Footer_DeveloperAndIT_MicrosoftAzure_nav","id":"n1c5c1c1m1r1a2","sN":1,"aN":"c5c1c1m1r1a2"}'>Azure</a> </li> <li> <a aria-label="Developer Center Developer & IT" class="c-uhff-link" href="https://developer.microsoft.com/en-us/" data-m='{"cN":"Footer_DeveloperAndIT_DeveloperCenter_nav","id":"n2c5c1c1m1r1a2","sN":2,"aN":"c5c1c1m1r1a2"}'>Developer Center</a> </li> <li> <a aria-label="Documentation Developer & IT" class="c-uhff-link" href="https://learn.microsoft.com/docs/" data-m='{"cN":"Footer_DeveloperAndIT_Documentation_nav","id":"n3c5c1c1m1r1a2","sN":3,"aN":"c5c1c1m1r1a2"}'>Documentation</a> </li> <li> <a aria-label="Microsoft Learn Developer & IT" class="c-uhff-link" href="https://learn.microsoft.com/" data-m='{"cN":"Footer_DeveloperAndIT_MicrosoftLearn_nav","id":"n4c5c1c1m1r1a2","sN":4,"aN":"c5c1c1m1r1a2"}'>Microsoft Learn</a> </li> <li> <a aria-label="Microsoft Tech Community Developer & IT" class="c-uhff-link" href="https://techcommunity.microsoft.com/" data-m='{"cN":"Footer_DeveloperAndIT_MicrosoftTechCommunity_nav","id":"n5c5c1c1m1r1a2","sN":5,"aN":"c5c1c1m1r1a2"}'>Microsoft Tech Community</a> </li> <li> <a aria-label="Azure Marketplace Developer & IT" class="c-uhff-link" href="https://azuremarketplace.microsoft.com/en-us/" data-m='{"cN":"Footer_DeveloperAndIT_AzureMarketplace_nav","id":"n6c5c1c1m1r1a2","sN":6,"aN":"c5c1c1m1r1a2"}'>Azure Marketplace</a> </li> <li> <a aria-label="AppSource Developer & IT" class="c-uhff-link" href="https://appsource.microsoft.com/en-us/" data-m='{"cN":"Footer_DeveloperAndIT_AppSource_nav","id":"n7c5c1c1m1r1a2","sN":7,"aN":"c5c1c1m1r1a2"}'>AppSource</a> </li> <li> <a aria-label="Visual Studio Developer & IT" class="c-uhff-link" href="https://visualstudio.microsoft.com/" data-m='{"cN":"Footer_DeveloperAndIT_MicrosoftVisualStudio_nav","id":"n8c5c1c1m1r1a2","sN":8,"aN":"c5c1c1m1r1a2"}'>Visual Studio</a> </li> </ul> </div> <div class="c-uhff-nav-group" data-m='{"cN":"footerNavColumn6_cont","cT":"Container","id":"c6c1c1m1r1a2","sN":6,"aN":"c1c1m1r1a2"}'> <div class="c-heading-4" role="heading" aria-level="2">Company</div> <ul class="c-list f-bare"> <li> <a aria-label="Careers Company" class="c-uhff-link" href="https://careers.microsoft.com/" data-m='{"cN":"Footer_Company_Careers_nav","id":"n1c6c1c1m1r1a2","sN":1,"aN":"c6c1c1m1r1a2"}'>Careers</a> </li> <li> <a aria-label="About Microsoft Company" class="c-uhff-link" href="https://www.microsoft.com/about" data-m='{"cN":"Footer_Company_AboutMicrosoft_nav","id":"n2c6c1c1m1r1a2","sN":2,"aN":"c6c1c1m1r1a2"}'>About Microsoft</a> </li> <li> <a aria-label="Company news Company" class="c-uhff-link" href="https://news.microsoft.com/" data-m='{"cN":"Footer_Company_CompanyNews_nav","id":"n3c6c1c1m1r1a2","sN":3,"aN":"c6c1c1m1r1a2"}'>Company news</a> </li> <li> <a aria-label="Privacy at Microsoft Company" class="c-uhff-link" href="https://privacy.microsoft.com/en-us" data-m='{"cN":"Footer_Company_PrivacyAtMicrosoft_nav","id":"n4c6c1c1m1r1a2","sN":4,"aN":"c6c1c1m1r1a2"}'>Privacy at Microsoft</a> </li> <li> <a aria-label="Investors Company" class="c-uhff-link" href="https://www.microsoft.com/investor/default.aspx" data-m='{"cN":"Footer_Company_Investors_nav","id":"n5c6c1c1m1r1a2","sN":5,"aN":"c6c1c1m1r1a2"}'>Investors</a> </li> <li> <a aria-label="Diversity and inclusion Company" class="c-uhff-link" href="https://www.microsoft.com/en-us/diversity/" data-m='{"cN":"Footer_Company_DiversityAndInclusion_nav","id":"n6c6c1c1m1r1a2","sN":6,"aN":"c6c1c1m1r1a2"}'>Diversity and inclusion</a> </li> <li> <a aria-label="Accessibility Company" class="c-uhff-link" href="https://www.microsoft.com/en-us/accessibility" data-m='{"cN":"Footer_Company_Accessibility_nav","id":"n7c6c1c1m1r1a2","sN":7,"aN":"c6c1c1m1r1a2"}'>Accessibility</a> </li> <li> <a aria-label="Sustainability Company" class="c-uhff-link" href="https://www.microsoft.com/en-us/sustainability/" data-m='{"cN":"Footer_Company_Sustainability_nav","id":"n8c6c1c1m1r1a2","sN":8,"aN":"c6c1c1m1r1a2"}'>Sustainability</a> </li> </ul> </div> </div> </nav> <div class="c-uhff-base"> <a id="locale-picker-link" aria-label="Content Language Selector. Currently set to English (United States)" class="c-uhff-link c-uhff-lang-selector c-glyph glyph-world" href="https://www.microsoft.com/en-us/security/locale" data-m='{"cN":"locale_picker(US)_nav","id":"n7c1c1m1r1a2","sN":7,"aN":"c1c1m1r1a2"}'>English (United States)</a> <a data-m='{"id":"n8c1c1m1r1a2","sN":8,"aN":"c1c1m1r1a2"}' href="https://aka.ms/yourcaliforniaprivacychoices" class='c-uhff-link c-uhff-ccpa'> <svg role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 14" xml:space="preserve" height="16" width="43"> <title>Your Privacy Choices Opt-Out Icon</title> <path d="M7.4 12.8h6.8l3.1-11.6H7.4C4.2 1.2 1.6 3.8 1.6 7s2.6 5.8 5.8 5.8z" style="fill-rule:evenodd;clip-rule:evenodd;fill:#fff"/> <path d="M22.6 0H7.4c-3.9 0-7 3.1-7 7s3.1 7 7 7h15.2c3.9 0 7-3.1 7-7s-3.2-7-7-7zm-21 7c0-3.2 2.6-5.8 5.8-5.8h9.9l-3.1 11.6H7.4c-3.2 0-5.8-2.6-5.8-5.8z" style="fill-rule:evenodd;clip-rule:evenodd;fill:#06f"/> <path d="M24.6 4c.2.2.2.6 0 .8L22.5 7l2.2 2.2c.2.2.2.6 0 .8-.2.2-.6.2-.8 0l-2.2-2.2-2.2 2.2c-.2.2-.6.2-.8 0-.2-.2-.2-.6 0-.8L20.8 7l-2.2-2.2c-.2-.2-.2-.6 0-.8.2-.2.6-.2.8 0l2.2 2.2L23.8 4c.2-.2.6-.2.8 0z" style="fill:#fff"/> <path d="M12.7 4.1c.2.2.3.6.1.8L8.6 9.8c-.1.1-.2.2-.3.2-.2.1-.5.1-.7-.1L5.4 7.7c-.2-.2-.2-.6 0-.8.2-.2.6-.2.8 0L8 8.6l3.8-4.5c.2-.2.6-.2.9 0z" style="fill:#06f"/> </svg> <span>Your Privacy Choices</span> </a> <noscript> <a data-m='{"id":"n9c1c1m1r1a2","sN":9,"aN":"c1c1m1r1a2"}' href="https://aka.ms/yourcaliforniaprivacychoices" class='c-uhff-link c-uhff-ccpa'> <svg role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 14" xml:space="preserve" height="16" width="43"> <title>Your Privacy Choices Opt-Out Icon</title> <path d="M7.4 12.8h6.8l3.1-11.6H7.4C4.2 1.2 1.6 3.8 1.6 7s2.6 5.8 5.8 5.8z" style="fill-rule:evenodd;clip-rule:evenodd;fill:#fff"/> <path d="M22.6 0H7.4c-3.9 0-7 3.1-7 7s3.1 7 7 7h15.2c3.9 0 7-3.1 7-7s-3.2-7-7-7zm-21 7c0-3.2 2.6-5.8 5.8-5.8h9.9l-3.1 11.6H7.4c-3.2 0-5.8-2.6-5.8-5.8z" style="fill-rule:evenodd;clip-rule:evenodd;fill:#06f"/> <path d="M24.6 4c.2.2.2.6 0 .8L22.5 7l2.2 2.2c.2.2.2.6 0 .8-.2.2-.6.2-.8 0l-2.2-2.2-2.2 2.2c-.2.2-.6.2-.8 0-.2-.2-.2-.6 0-.8L20.8 7l-2.2-2.2c-.2-.2-.2-.6 0-.8.2-.2.6-.2.8 0l2.2 2.2L23.8 4c.2-.2.6-.2.8 0z" style="fill:#fff"/> <path d="M12.7 4.1c.2.2.3.6.1.8L8.6 9.8c-.1.1-.2.2-.3.2-.2.1-.5.1-.7-.1L5.4 7.7c-.2-.2-.2-.6 0-.8.2-.2.6-.2.8 0L8 8.6l3.8-4.5c.2-.2.6-.2.9 0z" style="fill:#06f"/> </svg> <span>Your Privacy Choices</span> </a> </noscript> <a data-m='{"id":"n10c1c1m1r1a2","sN":10,"aN":"c1c1m1r1a2"}' href="https://go.microsoft.com/fwlink/?linkid=2259814" class="c-uhff-link c-uhff-consumer"> <span>Consumer Health Privacy</span> </a> <nav aria-label="Microsoft corporate links"> <ul class="c-list f-bare" data-m='{"cN":"Corp links_cont","cT":"Container","id":"c11c1c1m1r1a2","sN":11,"aN":"c1c1m1r1a2"}'> <li id="c-uhff-footer_sitemap"> <a class="c-uhff-link" href="https://www.microsoft.com/en-us/sitemap1.aspx" data-mscc-ic="false" data-m='{"cN":"Footer_Sitemap_nav","id":"n1c11c1c1m1r1a2","sN":1,"aN":"c11c1c1m1r1a2"}'>Sitemap</a> </li> <li id="c-uhff-footer_contactus"> <a class="c-uhff-link" href="https://support.microsoft.com/contactus" data-mscc-ic="false" data-m='{"cN":"Footer_ContactUs_nav","id":"n2c11c1c1m1r1a2","sN":2,"aN":"c11c1c1m1r1a2"}'>Contact Microsoft</a> </li> <li id="c-uhff-footer_privacyandcookies"> <a class="c-uhff-link" href="https://go.microsoft.com/fwlink/?LinkId=521839" data-mscc-ic="false" data-m='{"cN":"Footer_PrivacyandCookies_nav","id":"n3c11c1c1m1r1a2","sN":3,"aN":"c11c1c1m1r1a2"}'>Privacy </a> </li> <li class=" x-hidden" id="c-uhff-footer_managecookies"> <a class="c-uhff-link" href="#" data-mscc-ic="false" data-m='{"cN":"Footer_ManageCookies_nav","id":"n4c11c1c1m1r1a2","sN":4,"aN":"c11c1c1m1r1a2"}'>Manage cookies</a> </li> <li id="c-uhff-footer_termsofuse"> <a class="c-uhff-link" href="https://go.microsoft.com/fwlink/?LinkID=206977" data-mscc-ic="false" data-m='{"cN":"Footer_TermsOfUse_nav","id":"n5c11c1c1m1r1a2","sN":5,"aN":"c11c1c1m1r1a2"}'>Terms of use</a> </li> <li id="c-uhff-footer_trademarks"> <a class="c-uhff-link" href="https://go.microsoft.com/fwlink/?linkid=2196228" data-mscc-ic="false" data-m='{"cN":"Footer_Trademarks_nav","id":"n6c11c1c1m1r1a2","sN":6,"aN":"c11c1c1m1r1a2"}'>Trademarks</a> </li> <li id="c-uhff-footer_safetyandeco"> <a class="c-uhff-link" href="https://go.microsoft.com/fwlink/?linkid=2196227" data-mscc-ic="false" data-m='{"cN":"Footer_SafetyAndEco_nav","id":"n7c11c1c1m1r1a2","sN":7,"aN":"c11c1c1m1r1a2"}'>Safety & eco</a> </li> <li id="c-uhff-recycling"> <a class="c-uhff-link" href="https://www.microsoft.com/en-us/legal/compliance/recycling" data-mscc-ic="false" data-m='{"cN":"Recycling_nav","id":"n8c11c1c1m1r1a2","sN":8,"aN":"c11c1c1m1r1a2"}'>Recycling</a> </li> <li id="c-uhff-footer_aboutourads"> <a class="c-uhff-link" href="https://choice.microsoft.com" data-mscc-ic="false" data-m='{"cN":"Footer_AboutourAds_nav","id":"n9c11c1c1m1r1a2","sN":9,"aN":"c11c1c1m1r1a2"}'>About our ads</a> </li> <li>© Microsoft 2024</li> </ul> </nav> </div> </footer> <script id="uhf-footer-ccpa"> const globalPrivacyControlEnabled = navigator.globalPrivacyControl; const GPC_DataSharingOptIn = (globalPrivacyControlEnabled) ? false : checkThirdPartyAdsOptOutCookie(); function checkThirdPartyAdsOptOutCookie() { try { const ThirdPartyAdsOptOutCookieName = '3PAdsOptOut'; var cookieValue = getCookie(ThirdPartyAdsOptOutCookieName); return cookieValue != 1; } catch { return true; } } function getCookie(cookieName) { var cookieValue = document.cookie.match('(^|;)\\s*' + cookieName + '\\s*=\\s*([^;]+)'); return (cookieValue) ? cookieValue[2] : ''; } </script> </div> </div> </div> <script> function onConsentChanged( categoryPreferences ) { Metrics_3P_Scripts(); // If any categories are disabled, clear all cookies if ( ! siteConsent.getConsentFor( WcpConsent.consentCategories.Analytics ) ) { Metrics_Clear_Cookies( 'Analytics' ); } if ( ! siteConsent.getConsentFor( WcpConsent.consentCategories.Advertising ) ) { Metrics_Clear_Cookies( 'Advertising' ); } if ( ! siteConsent.getConsentFor( WcpConsent.consentCategories.SocialMedia ) ) { Metrics_Clear_Cookies( 'SocialMedia' ); } } function Metrics_Clear_Cookies( category ) { var all_cookies = document.cookie.split(";"); // array of cookie names to clear const cookie_names = [ '_clck', '_clsk', '_fbp', '_uetvid', 'mbox', 'AnalyticsSyncHistory', 'bcookie', 'bscookie', 'li_sugr', 'lidc', 'li_gc', 'UserMatchHistory', ]; for ( var i = 0; i < all_cookies.length; i++ ) { var cookie_name = all_cookies[i].split("=")[0].trim(); if ( cookie_names.includes( cookie_name ) ) { document.cookie = cookie_name + '=;expires=Thu, 01 Jan 1970 00:00:01 GMT;'; } } } function Metrics_3P_Scripts(){ // if GPC_DataSharingOptIn is set and true set Metrics_3POptIn var Metrics_3P_OptIn = false; if ( typeof GPC_DataSharingOptIn !== 'undefined' && GPC_DataSharingOptIn ) { Metrics_3P_OptIn = true; } else { Metrics_3P_OptIn = false; Metrics_Clear_Cookies(); } if ( siteConsent.getConsentFor( WcpConsent.consentCategories.Analytics ) && Metrics_3P_OptIn ) { if ( typeof comscoreTag === "function" ) { comscoreTag(); } if ( typeof microsoftAds === "function" ) { microsoftAds(); } if ( siteConsent.getConsentFor( WcpConsent.consentCategories.Advertising ) ) { if ( typeof adobeTargetTracking === "function" ) { adobeTargetTracking(); } if ( typeof clarityTracking === "function" ) { clarityTracking(); } if ( siteConsent.getConsentFor( WcpConsent.consentCategories.SocialMedia ) ) { if ( typeof facebookTracking === "function" ) { facebookTracking(); } if ( typeof linkedinTracking === "function" ) { linkedinTracking(); } } } if ( siteConsent.getConsentFor( WcpConsent.consentCategories.SocialMedia ) ) { } } if ( siteConsent.getConsentFor( WcpConsent.consentCategories.Advertising ) && Metrics_3P_OptIn ) { if ( typeof doubleclickTracking === "function" ) { doubleclickTracking(); } if ( siteConsent.getConsentFor( WcpConsent.consentCategories.SocialMedia ) ) { } } if ( siteConsent.getConsentFor( WcpConsent.consentCategories.SocialMedia ) && Metrics_3P_OptIn ) { } } window.WcpConsent && WcpConsent.init( "en-US", "ms-cookie-banner", function (err, _siteConsent) { if ( ! err ) { siteConsent = _siteConsent; //siteConsent is used to get the current consent var consentRequiredElementExists = document.getElementById( "c-uhff-footer_managecookies" ) && siteConsent.isConsentRequired; if ( consentRequiredElementExists ) { document.getElementById( "c-uhff-footer_managecookies" ).classList.remove("x-hidden"); document.getElementById( "c-uhff-footer_managecookies" ).onclick = function() { siteConsent.manageConsent(); }; } Metrics_3P_Scripts(); } else { console.log( "Error initializing WcpConsent: " + err ); } }, onConsentChanged ); </script> <script type="text/template" id="js-uhf-rss-template"> <div class="btn-group" id="filters-rss"> <a href="https://www.microsoft.com/en-us/security/blog/feed" class="btn" aria-label="RSS Feed" > <img src="https://www.microsoft.com/en-us/security/blog/wp-content/plugins/microsoft-uhf/assets/icon-rss.svg" alt="RSS Feed"/> </a> </div> </script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-content/plugins/syntaxhighlighter/syntaxhighlighter3/scripts/shCore.js?ver=3.0.9b" id="syntaxhighlighter-core-js"></script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-content/plugins/syntaxhighlighter/syntaxhighlighter3/scripts/shBrushPlain.js?ver=3.0.9b" id="syntaxhighlighter-brush-plain-js"></script> <script type='text/javascript'> (function(){ var corecss = document.createElement('link'); var themecss = document.createElement('link'); var corecssurl = "https://www.microsoft.com/en-us/security/blog/wp-content/plugins/syntaxhighlighter/syntaxhighlighter3/styles/shCore.css?ver=3.0.9b"; if ( corecss.setAttribute ) { corecss.setAttribute( "rel", "stylesheet" ); corecss.setAttribute( "type", "text/css" ); corecss.setAttribute( "href", corecssurl ); } else { corecss.rel = "stylesheet"; corecss.href = corecssurl; } document.head.appendChild( corecss ); var themecssurl = "https://www.microsoft.com/en-us/security/blog/wp-content/plugins/syntaxhighlighter/syntaxhighlighter3/styles/shThemeDefault.css?ver=3.0.9b"; if ( themecss.setAttribute ) { themecss.setAttribute( "rel", "stylesheet" ); themecss.setAttribute( "type", "text/css" ); themecss.setAttribute( "href", themecssurl ); } else { themecss.rel = "stylesheet"; themecss.href = themecssurl; } document.head.appendChild( themecss ); })(); SyntaxHighlighter.config.strings.expandSource = '+ expand source'; SyntaxHighlighter.config.strings.help = '?'; SyntaxHighlighter.config.strings.alert = 'SyntaxHighlighter\n\n'; SyntaxHighlighter.config.strings.noBrush = 'Can\'t find brush for: '; SyntaxHighlighter.config.strings.brushNotHtmlScript = 'Brush wasn\'t configured for html-script option: '; SyntaxHighlighter.defaults['pad-line-numbers'] = false; SyntaxHighlighter.defaults['toolbar'] = false; SyntaxHighlighter.all(); // Infinite scroll support if ( typeof( jQuery ) !== 'undefined' ) { jQuery( function( $ ) { $( document.body ).on( 'post-load', function() { SyntaxHighlighter.highlight(); } ); } ); } </script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-includes/js/dist/dom-ready.min.js?ver=f77871ff7694fffea381" id="wp-dom-ready-js"></script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-includes/js/dist/hooks.min.js?ver=2810c76e705dd1a53b18" id="wp-hooks-js"></script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-includes/js/dist/i18n.min.js?ver=5e580eb46a90c2b997e6" id="wp-i18n-js"></script> <script type="text/javascript" id="wp-i18n-js-after"> /* <![CDATA[ */ wp.i18n.setLocaleData( { 'text direction\u0004ltr': [ 'ltr' ] } ); /* ]]> */ </script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-includes/js/dist/a11y.min.js?ver=d90eebea464f6c09bfd5" id="wp-a11y-js"></script> <script type="text/javascript" id="ms_search_scripts-js-extra"> /* <![CDATA[ */ var cloudhubSearch = {"endpoint":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/ms-search\/v2\/search\/","origin":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","initialLoadResults":"{\"current_selections\":[{\"id\":\"orderby-newest-oldest\",\"label\":\"Sort by: Newest to oldest\",\"param\":\"sort-by\",\"value\":\"newest-oldest\",\"default\":false},{\"id\":\"term-3663\",\"label\":\"Content type: Research\",\"param\":\"content-type\",\"value\":\"research\",\"default\":false},{\"id\":\"date-any\",\"label\":\"Date: All dates\",\"param\":\"date\",\"value\":\"any\",\"default\":true}],\"current_url\":\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/content-type\\\/research\\\/?sort-by=newest-oldest&date=any\",\"facets\":[{\"id\":\"orderby-filter\",\"label\":\"Sort by\",\"name\":\"sort-by\",\"singular_label\":\"Sort by\",\"terms\":[{\"amount\":0,\"id\":\"orderby-relevance\",\"name\":\"Relevance\",\"slug\":\"relevance\",\"value\":\"relevance\",\"selected\":false,\"default\":true,\"taxonomy\":null,\"children\":[]},{\"amount\":0,\"id\":\"orderby-newest-oldest\",\"name\":\"Newest to oldest\",\"slug\":\"newest-oldest\",\"value\":\"newest-oldest\",\"selected\":true,\"default\":false,\"taxonomy\":null,\"children\":[]},{\"amount\":0,\"id\":\"orderby-oldest-newest\",\"name\":\"Oldest to newest\",\"slug\":\"oldest-newest\",\"value\":\"oldest-newest\",\"selected\":false,\"default\":false,\"taxonomy\":null,\"children\":[]}],\"kind\":\"singleitemlist\"},{\"id\":\"taxonomy-cc0af601bfd673427a8abb171f62c707\",\"label\":\"Content type\",\"name\":\"content-type\",\"singular_label\":\"Content type\",\"terms\":[{\"amount\":345,\"id\":\"term-3663\",\"name\":\"Research\",\"slug\":\"research\",\"value\":\"research\",\"selected\":true,\"taxonomy\":\"content-type\",\"children\":[]},{\"amount\":3,\"id\":\"term-3661\",\"name\":\"Industry trends\",\"slug\":\"industry-trends\",\"value\":\"industry-trends\",\"selected\":false,\"taxonomy\":\"content-type\",\"children\":[]},{\"amount\":2,\"id\":\"term-3662\",\"name\":\"News\",\"slug\":\"news\",\"value\":\"news\",\"selected\":false,\"taxonomy\":\"content-type\",\"children\":[]}],\"kind\":\"multiitemlist\"},{\"id\":\"taxonomy-9d9b68ac2b1de18d3712096354b3c3a5\",\"label\":\"Topic\",\"name\":\"topic\",\"singular_label\":\"Topic\",\"terms\":[{\"amount\":336,\"id\":\"term-3687\",\"name\":\"Threat intelligence\",\"slug\":\"threat-intelligence\",\"value\":\"threat-intelligence\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":30,\"id\":\"term-3674\",\"name\":\"Incident response\",\"slug\":\"incident-response\",\"value\":\"incident-response\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":11,\"id\":\"term-3664\",\"name\":\"AI and machine learning\",\"slug\":\"ai-and-machine-learning\",\"value\":\"ai-and-machine-learning\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":6,\"id\":\"term-3672\",\"name\":\"Endpoint security\",\"slug\":\"endpoint-security\",\"value\":\"endpoint-security\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":5,\"id\":\"term-3684\",\"name\":\"Security operations\",\"slug\":\"security-operations\",\"value\":\"security-operations\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":4,\"id\":\"term-3676\",\"name\":\"IoT security\",\"slug\":\"iot-security\",\"value\":\"iot-security\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":4,\"id\":\"term-3688\",\"name\":\"Threat trends\",\"slug\":\"threat-trends\",\"value\":\"threat-trends\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":3,\"id\":\"term-3665\",\"name\":\"Analyst reports\",\"slug\":\"analyst-reports\",\"value\":\"analyst-reports\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":3,\"id\":\"term-3667\",\"name\":\"Cloud security\",\"slug\":\"cloud-security\",\"value\":\"cloud-security\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":2,\"id\":\"term-3671\",\"name\":\"Email security\",\"slug\":\"email-security\",\"value\":\"email-security\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":2,\"id\":\"term-3673\",\"name\":\"Identity and access management\",\"slug\":\"identity-and-access-management\",\"value\":\"identity-and-access-management\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":2,\"id\":\"term-3686\",\"name\":\"Small and medium business\",\"slug\":\"small-and-medium-business\",\"value\":\"small-and-medium-business\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":2,\"id\":\"term-3689\",\"name\":\"Zero Trust\",\"slug\":\"zero-trust\",\"value\":\"zero-trust\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":1,\"id\":\"term-4121\",\"name\":\"Data security\",\"slug\":\"data-security\",\"value\":\"data-security\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":1,\"id\":\"term-3678\",\"name\":\"Multifactor authentication\",\"slug\":\"multifactor-authentication\",\"value\":\"multifactor-authentication\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":1,\"id\":\"term-3683\",\"name\":\"Security management\",\"slug\":\"security-management\",\"value\":\"security-management\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]},{\"amount\":1,\"id\":\"term-3685\",\"name\":\"SIEM and XDR\",\"slug\":\"siem-and-xdr\",\"value\":\"siem-and-xdr\",\"selected\":false,\"taxonomy\":\"topic\",\"children\":[]}],\"kind\":\"multiitemlist\"},{\"id\":\"taxonomy-86024cad1e83101d97359d7351051156\",\"label\":\"Products and services\",\"name\":\"products\",\"singular_label\":\"Products and services\",\"terms\":[{\"amount\":114,\"id\":\"term-3690\",\"name\":\"Microsoft Defender\",\"slug\":\"microsoft-defender\",\"value\":\"microsoft-defender\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":71,\"id\":\"term-3694\",\"name\":\"Microsoft Defender for Endpoint\",\"slug\":\"microsoft-defender-for-endpoint\",\"value\":\"microsoft-defender-for-endpoint\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":43,\"id\":\"term-3693\",\"name\":\"Microsoft Defender XDR\",\"slug\":\"microsoft-defender-xdr\",\"value\":\"microsoft-defender-xdr\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":23,\"id\":\"term-3726\",\"name\":\"Microsoft Sentinel\",\"slug\":\"microsoft-sentinel\",\"value\":\"microsoft-sentinel\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":20,\"id\":\"term-3695\",\"name\":\"Microsoft Defender for Office 365\",\"slug\":\"microsoft-defender-for-office-365\",\"value\":\"microsoft-defender-for-office-365\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":14,\"id\":\"term-3698\",\"name\":\"Microsoft Defender Threat Intelligence\",\"slug\":\"microsoft-defender-threat-intelligence\",\"value\":\"microsoft-defender-threat-intelligence\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":12,\"id\":\"term-3692\",\"name\":\"Microsoft Defender for Cloud Apps\",\"slug\":\"microsoft-defender-for-cloud-apps\",\"value\":\"microsoft-defender-for-cloud-apps\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":11,\"id\":\"term-3856\",\"name\":\"Microsoft Defender Vulnerability Management\",\"slug\":\"microsoft-defender-vulnerability-management\",\"value\":\"microsoft-defender-vulnerability-management\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":10,\"id\":\"term-3720\",\"name\":\"Microsoft Security Experts\",\"slug\":\"microsoft-security-experts\",\"value\":\"microsoft-security-experts\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":9,\"id\":\"term-3696\",\"name\":\"Microsoft Defender for Identity\",\"slug\":\"microsoft-defender-for-identity\",\"value\":\"microsoft-defender-for-identity\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":9,\"id\":\"term-3699\",\"name\":\"Microsoft Defender for IoT\",\"slug\":\"microsoft-defender-for-iot\",\"value\":\"microsoft-defender-for-iot\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":9,\"id\":\"term-3702\",\"name\":\"Microsoft Entra\",\"slug\":\"microsoft-entra\",\"value\":\"microsoft-entra\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":8,\"id\":\"term-3691\",\"name\":\"Microsoft Defender for Cloud\",\"slug\":\"microsoft-defender-for-cloud\",\"value\":\"microsoft-defender-for-cloud\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":6,\"id\":\"term-3703\",\"name\":\"Microsoft Entra ID\",\"slug\":\"microsoft-entra-id\",\"value\":\"microsoft-entra-id\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":6,\"id\":\"term-3854\",\"name\":\"Microsoft Incident Response\",\"slug\":\"microsoft-incident-response\",\"value\":\"microsoft-incident-response\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":5,\"id\":\"term-3721\",\"name\":\"Microsoft Defender Experts for Hunting\",\"slug\":\"microsoft-defender-experts-for-hunting\",\"value\":\"microsoft-defender-experts-for-hunting\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":4,\"id\":\"term-3719\",\"name\":\"Microsoft Security Copilot\",\"slug\":\"microsoft-security-copilot\",\"value\":\"microsoft-security-copilot\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":3,\"id\":\"term-4139\",\"name\":\"Microsoft Entra ID Protection\",\"slug\":\"microsoft-entra-id-protection\",\"value\":\"microsoft-entra-id-protection\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":1,\"id\":\"term-3851\",\"name\":\"Microsoft Defender Experts for XDR\",\"slug\":\"microsoft-defender-experts-for-xdr\",\"value\":\"microsoft-defender-experts-for-xdr\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":1,\"id\":\"term-3875\",\"name\":\"Microsoft Defender External Attack Surface Management\",\"slug\":\"microsoft-defender-external-attack-surface-management\",\"value\":\"microsoft-defender-external-attack-surface-management\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":1,\"id\":\"term-3706\",\"name\":\"Microsoft Intune\",\"slug\":\"microsoft-intune\",\"value\":\"microsoft-intune\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]},{\"amount\":1,\"id\":\"term-3710\",\"name\":\"Microsoft Purview\",\"slug\":\"microsoft-purview\",\"value\":\"microsoft-purview\",\"selected\":false,\"taxonomy\":\"products\",\"children\":[]}],\"kind\":\"multiitemlist\"},{\"id\":\"taxonomy-bc5977d96a96140eccba6514a0c53308\",\"label\":\"Threat intelligence\",\"name\":\"threat-intelligence\",\"singular_label\":\"Threat intelligence\",\"terms\":[{\"amount\":123,\"id\":\"term-3727\",\"name\":\"Attacker techniques, tools, and infrastructure\",\"slug\":\"attacker-techniques-tools-and-infrastructure\",\"value\":\"attacker-techniques-tools-and-infrastructure\",\"selected\":false,\"taxonomy\":\"threat-intelligence\",\"children\":[]},{\"amount\":98,\"id\":\"term-3738\",\"name\":\"Threat actors\",\"slug\":\"threat-actors\",\"value\":\"threat-actors\",\"selected\":false,\"taxonomy\":\"threat-intelligence\",\"children\":[]},{\"amount\":62,\"id\":\"term-3739\",\"name\":\"Vulnerabilities and exploits\",\"slug\":\"vulnerabilities-and-exploits\",\"value\":\"vulnerabilities-and-exploits\",\"selected\":false,\"taxonomy\":\"threat-intelligence\",\"children\":[]},{\"amount\":45,\"id\":\"term-3735\",\"name\":\"Ransomware\",\"slug\":\"ransomware\",\"value\":\"ransomware\",\"selected\":false,\"taxonomy\":\"threat-intelligence\",\"children\":[]},{\"amount\":40,\"id\":\"term-3736\",\"name\":\"Social engineering \\\/ phishing\",\"slug\":\"social-engineering-phishing\",\"value\":\"social-engineering-phishing\",\"selected\":false,\"taxonomy\":\"threat-intelligence\",\"children\":[]},{\"amount\":26,\"id\":\"term-3732\",\"name\":\"Influence operations\",\"slug\":\"influence-operations\",\"value\":\"influence-operations\",\"selected\":false,\"taxonomy\":\"threat-intelligence\",\"children\":[]},{\"amount\":20,\"id\":\"term-3730\",\"name\":\"Cybercrime\",\"slug\":\"cybercrime\",\"value\":\"cybercrime\",\"selected\":false,\"taxonomy\":\"threat-intelligence\",\"children\":[]},{\"amount\":13,\"id\":\"term-3729\",\"name\":\"Cloud threats\",\"slug\":\"cloud-threats\",\"value\":\"cloud-threats\",\"selected\":false,\"taxonomy\":\"threat-intelligence\",\"children\":[]},{\"amount\":10,\"id\":\"term-3737\",\"name\":\"Supply chain attacks\",\"slug\":\"supply-chain-attacks\",\"value\":\"supply-chain-attacks\",\"selected\":false,\"taxonomy\":\"threat-intelligence\",\"children\":[]},{\"amount\":9,\"id\":\"term-3733\",\"name\":\"IoT \\\/ OT threats\",\"slug\":\"iot-ot-threats\",\"value\":\"iot-ot-threats\",\"selected\":false,\"taxonomy\":\"threat-intelligence\",\"children\":[]},{\"amount\":8,\"id\":\"term-3728\",\"name\":\"Business email compromise\",\"slug\":\"business-email-compromise\",\"value\":\"business-email-compromise\",\"selected\":false,\"taxonomy\":\"threat-intelligence\",\"children\":[]},{\"amount\":7,\"id\":\"term-3734\",\"name\":\"Mobile threats\",\"slug\":\"mobile-threats\",\"value\":\"mobile-threats\",\"selected\":false,\"taxonomy\":\"threat-intelligence\",\"children\":[]},{\"amount\":5,\"id\":\"term-4237\",\"name\":\"AI threats\",\"slug\":\"ai-threats\",\"value\":\"ai-threats\",\"selected\":false,\"taxonomy\":\"threat-intelligence\",\"children\":[]}],\"kind\":\"multiitemlist\"},{\"id\":\"date-filter\",\"label\":\"Date\",\"name\":\"date\",\"singular_label\":\"Date\",\"terms\":[{\"amount\":345,\"id\":\"date-any\",\"name\":\"All dates\",\"slug\":\"any\",\"value\":\"any\",\"selected\":true,\"default\":true,\"taxonomy\":\"date\"},{\"amount\":6,\"id\":\"date-30-days\",\"name\":\"Last 30 days\",\"slug\":\"30-days\",\"value\":\"30-days\",\"selected\":false,\"default\":false,\"taxonomy\":\"date\"},{\"amount\":11,\"id\":\"date-90-days\",\"name\":\"Last 90 days\",\"slug\":\"90-days\",\"value\":\"90-days\",\"selected\":false,\"default\":false,\"taxonomy\":\"date\"},{\"amount\":20,\"id\":\"date-6-months\",\"name\":\"Last 6 months\",\"slug\":\"6-months\",\"value\":\"6-months\",\"selected\":false,\"default\":false,\"taxonomy\":\"date\"},{\"amount\":36,\"id\":\"date-12-months\",\"name\":\"Last 12 months\",\"slug\":\"12-months\",\"value\":\"12-months\",\"selected\":false,\"default\":false,\"taxonomy\":\"date\"},{\"amount\":345,\"id\":\"date-custom-range\",\"name\":\"Custom range\",\"slug\":\"custom-range\",\"value\":\"custom-range\",\"selected\":false,\"default\":false,\"taxonomy\":\"date\"}],\"kind\":\"date\",\"start_date\":\"\",\"end_date\":\"\"}],\"found_posts\":345,\"page\":1,\"posts\":[{\"id\":136520,\"title\":\"Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON\",\"html\":\"<article\\n\\tid=\\\"post-136520\\\"\\n\\tclass=\\\"card material-card material-card--mobile h-100 is-entire-card-clickable post-136520 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-threat-intelligence threat-intelligence-ai-threats threat-intelligence-attacker-techniques-tools-and-infrastructure threat-intelligence-social-engineering-phishing threat-intelligence-threat-actors tag-sleet tag-storm review-flag-1694638265-576 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-4-1694638266-512 review-flag-5-1694638266-171 review-flag-6-1694638266-691 review-flag-7-1694638266-851 review-flag-exclu-1694638263-940 review-flag-new-1694638263-340\\\">\\n\\t\\t\\t<div class=\\\"card__image card-img card__image--medium pt-md-4 mt-md-3\\\">\\n\\t\\t\\t<div class=\\\"embed-responsive embed-responsive-16by9\\\">\\n\\t\\t\\t\\t<img width=\\\"300\\\" height=\\\"200\\\" src=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Microsoft-at-CYBERWARCON-2024-300x200.webp\\\" class=\\\"card-img embed-responsive-item img-object-cover wp-post-image\\\" alt=\\\"Photo of business professionals in foyer walking, chatting, holding deivces\\\" decoding=\\\"async\\\" fetchpriority=\\\"high\\\" srcset=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Microsoft-at-CYBERWARCON-2024-300x200.webp 300w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Microsoft-at-CYBERWARCON-2024-1024x684.webp 1024w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Microsoft-at-CYBERWARCON-2024-768x513.webp 768w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Microsoft-at-CYBERWARCON-2024.webp 1200w\\\" sizes=\\\"(max-width: 300px) 100vw, 300px\\\" \\\/>\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\t\\n\\t<div class=\\\"card__content card-body p-4 p-md-0\\\">\\n\\t\\t<div class=\\\"card__meta mb-g d-flex flex-wrap align-items-baseline\\\">\\n\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0\\\">\\n\\t\\t\\t\\t\\t<ul class=\\\"list-unstyled d-flex flex-wrap m-0\\\">\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/content-type\\\/research\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Research\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tResearch\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/topic\\\/threat-intelligence\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Threat intelligence\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"2\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tThreat intelligence\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/products\\\/microsoft-defender-threat-intelligence\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Microsoft Defender Threat Intelligence\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"3\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tMicrosoft Defender Threat Intelligence\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/threat-intelligence\\\/threat-actors\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Threat actors\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"4\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tThreat actors\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<\\\/ul><\\\/div> \\t\\t\\t\\t\\t\\t<div class=\\\"card__meta-group d-inline-flex\\\">\\n\\t\\t\\t\\t<div class=\\\"card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t<span class=\\\"sr-only\\\">Published<\\\/span> <time datetime=\\\"2024-11-22T03:00:00-08:00\\\">Nov 22<\\\/time>\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__read-time d-sm-inline-flex align-items-center font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t\\t10 min read\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\n\\t\\t<h2 class=\\\"m-0 mb-g mb-lg-3 h3\\\">\\n\\t\\t\\t<a\\n\\t\\t\\t\\tclass=\\\"cta\\\"\\n\\t\\t\\t\\tdata-bi-cn=\\\"Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON\\\"\\n\\t\\t\\t\\tdata-bi-id=\\\"136520\\\"\\n\\t\\t\\t\\tdata-bi-ct=\\\"title link\\\"\\n\\t\\t\\t\\tdata-bi-tn=\\\"search-result-card\\\"\\n\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/2024\\\/11\\\/22\\\/microsoft-shares-latest-intelligence-on-north-korean-and-chinese-threat-actors-at-cyberwarcon\\\/\\\"\\n\\t\\t\\t>\\n\\t\\t\\t\\t<span>Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON<\\\/span>\\u00a0<span class=\\\"glyph-prepend glyph-prepend-small glyph-prepend-chevron-right\\\" aria-hidden=\\\"true\\\"><\\\/span>\\n\\t\\t\\t<\\\/a>\\n\\t\\t<\\\/h2>\\n\\t\\t<p class=\\\"text-neutral-800\\\">\\n\\t\\t\\tAt CYBERWARCON 2024, Microsoft Threat Intelligence analysts will share research and insights on North Korean and Chinese threat actors representing years of threat actor tracking, infrastructure monitoring and disruption, and their attack tooling.\\t\\t<\\\/p>\\n\\t<\\\/div>\\n\\n<\\\/article>\\n\"},{\"id\":136355,\"title\":\"Microsoft Data Security Index annual report\\u00a0highlights evolving generative AI security needs\",\"html\":\"<article\\n\\tid=\\\"post-136355\\\"\\n\\tclass=\\\"card material-card material-card--mobile h-100 is-entire-card-clickable post-136355 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-ai-and-machine-learning topic-data-security review-flag-1-1694638265-354 review-flag-integ-1694638263-281 review-flag-new-1694638263-340 review-flag-percent\\\">\\n\\t\\t\\t<div class=\\\"card__image card-img card__image--medium pt-md-4 mt-md-3\\\">\\n\\t\\t\\t<div class=\\\"embed-responsive embed-responsive-16by9\\\">\\n\\t\\t\\t\\t<img width=\\\"300\\\" height=\\\"200\\\" src=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Security-ScannedImagery-Blue-Revised-300x200.jpg\\\" class=\\\"card-img embed-responsive-item img-object-cover wp-post-image\\\" alt=\\\"Close-up of a person typing on a laptop\\\" decoding=\\\"async\\\" srcset=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Security-ScannedImagery-Blue-Revised-300x200.jpg 300w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Security-ScannedImagery-Blue-Revised-1024x683.jpg 1024w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Security-ScannedImagery-Blue-Revised-768x512.jpg 768w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Security-ScannedImagery-Blue-Revised-1536x1024.jpg 1536w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Security-ScannedImagery-Blue-Revised-2048x1365.jpg 2048w\\\" sizes=\\\"(max-width: 300px) 100vw, 300px\\\" \\\/>\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\t\\n\\t<div class=\\\"card__content card-body p-4 p-md-0\\\">\\n\\t\\t<div class=\\\"card__meta mb-g d-flex flex-wrap align-items-baseline\\\">\\n\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0\\\">\\n\\t\\t\\t\\t\\t<ul class=\\\"list-unstyled d-flex flex-wrap m-0\\\">\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/content-type\\\/research\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Research\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tResearch\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/topic\\\/ai-and-machine-learning\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"AI and machine learning\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"2\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tAI and machine learning\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<\\\/ul><\\\/div> \\t\\t\\t\\t\\t\\t<div class=\\\"card__meta-group d-inline-flex\\\">\\n\\t\\t\\t\\t<div class=\\\"card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t<span class=\\\"sr-only\\\">Published<\\\/span> <time datetime=\\\"2024-11-13T09:00:00-08:00\\\">Nov 13<\\\/time>\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__read-time d-sm-inline-flex align-items-center font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t\\t5 min read\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\n\\t\\t<h2 class=\\\"m-0 mb-g mb-lg-3 h3\\\">\\n\\t\\t\\t<a\\n\\t\\t\\t\\tclass=\\\"cta\\\"\\n\\t\\t\\t\\tdata-bi-cn=\\\"Microsoft Data Security Index annual report\\u00a0highlights evolving generative AI security needs\\\"\\n\\t\\t\\t\\tdata-bi-id=\\\"136355\\\"\\n\\t\\t\\t\\tdata-bi-ct=\\\"title link\\\"\\n\\t\\t\\t\\tdata-bi-tn=\\\"search-result-card\\\"\\n\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/2024\\\/11\\\/13\\\/microsoft-data-security-index-annual-report-highlights-evolving-generative-ai-security-needs\\\/\\\"\\n\\t\\t\\t>\\n\\t\\t\\t\\t<span>Microsoft Data Security Index annual report\\u00a0highlights evolving generative AI security needs<\\\/span>\\u00a0<span class=\\\"glyph-prepend glyph-prepend-small glyph-prepend-chevron-right\\\" aria-hidden=\\\"true\\\"><\\\/span>\\n\\t\\t\\t<\\\/a>\\n\\t\\t<\\\/h2>\\n\\t\\t<p class=\\\"text-neutral-800\\\">\\n\\t\\t\\t84% of surveyed organizations want to feel more confident about managing and discovering data input into AI apps and tools.\\t\\t<\\\/p>\\n\\t<\\\/div>\\n\\n<\\\/article>\\n\"},{\"id\":136332,\"title\":\"DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration\",\"html\":\"<article\\n\\tid=\\\"post-136332\\\"\\n\\tclass=\\\"card material-card material-card--mobile h-100 is-entire-card-clickable post-136332 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-security-management topic-security-operations topic-zero-trust review-flag-5-1694638266-171 review-flag-dod-1694638267-531 review-flag-new-1694638263-340 review-flag-partn-1694638263-177 review-flag-unite-1694638267-167\\\">\\n\\t\\t\\t<div class=\\\"card__image card-img card__image--medium pt-md-4 mt-md-3\\\">\\n\\t\\t\\t<div class=\\\"embed-responsive embed-responsive-16by9\\\">\\n\\t\\t\\t\\t<img width=\\\"300\\\" height=\\\"186\\\" src=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Security_386866_Blog_241108-300x186.webp\\\" class=\\\"card-img embed-responsive-item img-object-cover wp-post-image\\\" alt=\\\"Side profile of a woman wearing a dark shirt in a dim office scrolling or working on a Microsoft Surface Studio.\\\" decoding=\\\"async\\\" srcset=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Security_386866_Blog_241108-300x186.webp 300w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Security_386866_Blog_241108-1024x634.webp 1024w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Security_386866_Blog_241108-768x475.webp 768w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Security_386866_Blog_241108.webp 1260w\\\" sizes=\\\"(max-width: 300px) 100vw, 300px\\\" \\\/>\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\t\\n\\t<div class=\\\"card__content card-body p-4 p-md-0\\\">\\n\\t\\t<div class=\\\"card__meta mb-g d-flex flex-wrap align-items-baseline\\\">\\n\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0\\\">\\n\\t\\t\\t\\t\\t<ul class=\\\"list-unstyled d-flex flex-wrap m-0\\\">\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/content-type\\\/research\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Research\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tResearch\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/topic\\\/zero-trust\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Zero Trust\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"2\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tZero Trust\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<\\\/ul><\\\/div> \\t\\t\\t\\t\\t\\t<div class=\\\"card__meta-group d-inline-flex\\\">\\n\\t\\t\\t\\t<div class=\\\"card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t<span class=\\\"sr-only\\\">Published<\\\/span> <time datetime=\\\"2024-11-11T09:00:00-08:00\\\">Nov 11<\\\/time>\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__read-time d-sm-inline-flex align-items-center font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t\\t4 min read\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\n\\t\\t<h2 class=\\\"m-0 mb-g mb-lg-3 h3\\\">\\n\\t\\t\\t<a\\n\\t\\t\\t\\tclass=\\\"cta\\\"\\n\\t\\t\\t\\tdata-bi-cn=\\\"DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration\\\"\\n\\t\\t\\t\\tdata-bi-id=\\\"136332\\\"\\n\\t\\t\\t\\tdata-bi-ct=\\\"title link\\\"\\n\\t\\t\\t\\tdata-bi-tn=\\\"search-result-card\\\"\\n\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/2024\\\/11\\\/11\\\/dod-zero-trust-strategy-proves-security-benchmark-years-ahead-of-schedule-with-microsoft-collaboration\\\/\\\"\\n\\t\\t\\t>\\n\\t\\t\\t\\t<span>DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration<\\\/span>\\u00a0<span class=\\\"glyph-prepend glyph-prepend-small glyph-prepend-chevron-right\\\" aria-hidden=\\\"true\\\"><\\\/span>\\n\\t\\t\\t<\\\/a>\\n\\t\\t<\\\/h2>\\n\\t\\t<p class=\\\"text-neutral-800\\\">\\n\\t\\t\\tThe Navy implementation scored a 100 percent success rate, meeting DoD requirements on all 91 Target-Level activities tested.\\t\\t<\\\/p>\\n\\t<\\\/div>\\n\\n<\\\/article>\\n\"},{\"id\":136262,\"title\":\"Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network\",\"html\":\"<article\\n\\tid=\\\"post-136262\\\"\\n\\tclass=\\\"card material-card material-card--mobile h-100 is-entire-card-clickable post-136262 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-for-cloud-apps products-microsoft-defender-for-endpoint products-microsoft-defender-for-identity products-microsoft-defender-xdr products-microsoft-sentinel threat-intelligence-attacker-techniques-tools-and-infrastructure threat-intelligence-threat-actors tag-storm review-flag-1694638265-576 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-4-1694638266-512 review-flag-5-1694638266-171 review-flag-7-1694638266-851 review-flag-8-1694638266-352 review-flag-disable review-flag-new-1694638263-340 review-flag-percent\\\">\\n\\t\\t\\t<div class=\\\"card__image card-img card__image--medium pt-md-4 mt-md-3\\\">\\n\\t\\t\\t<div class=\\\"embed-responsive embed-responsive-16by9\\\">\\n\\t\\t\\t\\t<img width=\\\"300\\\" height=\\\"200\\\" src=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CLO20_Edgar_Norris_003-300x200.jpg\\\" class=\\\"card-img embed-responsive-item img-object-cover wp-post-image\\\" alt=\\\"Photo of lobby\\\" decoding=\\\"async\\\" srcset=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CLO20_Edgar_Norris_003-300x200.jpg 300w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CLO20_Edgar_Norris_003-1024x683.jpg 1024w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CLO20_Edgar_Norris_003-768x512.jpg 768w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CLO20_Edgar_Norris_003-1536x1024.jpg 1536w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CLO20_Edgar_Norris_003-2048x1365.jpg 2048w\\\" sizes=\\\"(max-width: 300px) 100vw, 300px\\\" \\\/>\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\t\\n\\t<div class=\\\"card__content card-body p-4 p-md-0\\\">\\n\\t\\t<div class=\\\"card__meta mb-g d-flex flex-wrap align-items-baseline\\\">\\n\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0\\\">\\n\\t\\t\\t\\t\\t<ul class=\\\"list-unstyled d-flex flex-wrap m-0\\\">\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/content-type\\\/research\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Research\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tResearch\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/topic\\\/threat-intelligence\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Threat intelligence\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"2\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tThreat intelligence\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/products\\\/microsoft-defender-xdr\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Microsoft Defender XDR\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"3\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tMicrosoft Defender XDR\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/threat-intelligence\\\/attacker-techniques-tools-and-infrastructure\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Attacker techniques, tools, and infrastructure\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"4\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tAttacker techniques, tools, and infrastructure\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<\\\/ul><\\\/div> \\t\\t\\t\\t\\t\\t<div class=\\\"card__meta-group d-inline-flex\\\">\\n\\t\\t\\t\\t<div class=\\\"card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t<span class=\\\"sr-only\\\">Published<\\\/span> <time datetime=\\\"2024-10-31T10:00:00-07:00\\\">Oct 31<\\\/time>\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__read-time d-sm-inline-flex align-items-center font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t\\t8 min read\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\n\\t\\t<h2 class=\\\"m-0 mb-g mb-lg-3 h3\\\">\\n\\t\\t\\t<a\\n\\t\\t\\t\\tclass=\\\"cta\\\"\\n\\t\\t\\t\\tdata-bi-cn=\\\"Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network\\\"\\n\\t\\t\\t\\tdata-bi-id=\\\"136262\\\"\\n\\t\\t\\t\\tdata-bi-ct=\\\"title link\\\"\\n\\t\\t\\t\\tdata-bi-tn=\\\"search-result-card\\\"\\n\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/2024\\\/10\\\/31\\\/chinese-threat-actor-storm-0940-uses-credentials-from-password-spray-attacks-from-a-covert-network\\\/\\\"\\n\\t\\t\\t>\\n\\t\\t\\t\\t<span>Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network<\\\/span>\\u00a0<span class=\\\"glyph-prepend glyph-prepend-small glyph-prepend-chevron-right\\\" aria-hidden=\\\"true\\\"><\\\/span>\\n\\t\\t\\t<\\\/a>\\n\\t\\t<\\\/h2>\\n\\t\\t<p class=\\\"text-neutral-800\\\">\\n\\t\\t\\tSince August 2023, Microsoft has observed intrusion activity targeting and successfully stealing credentials from multiple Microsoft customers that is enabled by highly evasive password spray attacks. Microsoft has linked the source of these password spray attacks to a network of compromised devices we track as CovertNetwork-1658, also known as xlogin and Quad7 (7777).\\t\\t<\\\/p>\\n\\t<\\\/div>\\n\\n<\\\/article>\\n\"},{\"id\":0,\"title\":\"Promo\",\"html\":\"<div class=\\\"promo-banner promo-in-loop my-4 post-130077 ms-promo type-ms-promo status-publish hentry content-type-best-practices content-type-events content-type-industry-trends content-type-news content-type-research topic-analyst-reports topic-incident-response topic-risk-management topic-security-management topic-siem-and-xdr topic-threat-trends products-microsoft-defender-experts-for-hunting products-microsoft-security-experts\\\"><div class=\\\"wp-block-msxcm-cta-block\\\" data-moray data-bi-an=\\\"CTA Block\\\">\\n\\t<div class=\\\"card d-block mx-ng mx-md-0\\\">\\n\\t\\t<div class=\\\"row no-gutters material-color-dark bg-dark-orange\\\">\\n\\n\\t\\t\\t\\n\\t\\t\\t<div class=\\\"d-flex col-md\\\">\\n\\t\\t\\t\\t<div class=\\\"card-body align-self-center p-4 p-md-5\\\">\\n\\t\\t\\t\\t\\t<h2>Retain Microsoft Security Experts<\\\/h2>\\n\\n\\t\\t\\t\\t\\t<div class=\\\"mb-3\\\">\\n\\t\\t\\t\\t\\t\\t<p>Microsoft Security Experts are now available to strengthen your team with managed security services. Learn how to defend against threats with security experts.<\\\/p>\\n\\t\\t\\t\\t\\t<\\\/div>\\n\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<div class=\\\"link-group\\\">\\n\\t\\t\\t\\t\\t\\t\\t<a href=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/business\\\/services\\\" class=\\\"btn btn-primary bg-body text-body\\\" >\\n\\t\\t\\t\\t\\t\\t\\t\\t<span>Get started<\\\/span>\\n\\t\\t\\t\\t\\t\\t\\t\\t<span class=\\\"glyph-append glyph-append-chevron-right glyph-append-xsmall\\\"><\\\/span>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t<\\\/div>\\n\\n\\t\\t\\t\\t\\t\\t\\t<div class=\\\"col-md-4\\\">\\n\\t\\t\\t\\t\\t<img decoding=\\\"async\\\" width=\\\"1024\\\" height=\\\"692\\\" src=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Microsoft-Security-illustration-metaphors_211101_illus-pillar-comprehensive-security_Orange-1024x692.webp\\\" class=\\\"card-img img-object-cover\\\" alt=\\\"\\\" srcset=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Microsoft-Security-illustration-metaphors_211101_illus-pillar-comprehensive-security_Orange-1024x692.webp 1024w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Microsoft-Security-illustration-metaphors_211101_illus-pillar-comprehensive-security_Orange-300x203.webp 300w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Microsoft-Security-illustration-metaphors_211101_illus-pillar-comprehensive-security_Orange-768x519.webp 768w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Microsoft-Security-illustration-metaphors_211101_illus-pillar-comprehensive-security_Orange-1536x1039.webp 1536w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Microsoft-Security-illustration-metaphors_211101_illus-pillar-comprehensive-security_Orange-2048x1385.webp 2048w\\\" sizes=\\\"(max-width: 1024px) 100vw, 1024px\\\" \\\/>\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t<\\\/div>\\n\\t<\\\/div>\\n<\\\/div>\\n<\\\/div><!-- args: {\\\"tax_query\\\":[{\\\"taxonomy\\\":\\\"content-type\\\",\\\"field\\\":\\\"term_id\\\",\\\"terms\\\":3663}],\\\"orderby\\\":\\\"date\\\",\\\"offset\\\":0} context: {\\\"is_search\\\":true,\\\"page\\\":1,\\\"shown\\\":0}-->\"},{\"id\":136153,\"title\":\"\\u200b\\u200b7 cybersecurity trends and tips for small and medium businesses to stay protected\",\"html\":\"<article\\n\\tid=\\\"post-136153\\\"\\n\\tclass=\\\"card material-card material-card--mobile h-100 is-entire-card-clickable post-136153 post type-post status-publish format-standard has-post-thumbnail hentry content-type-industry-trends content-type-research topic-small-and-medium-business tag-security-strategies review-flag-1694638271-781 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-4-1694638266-512 review-flag-5-1694638266-171 review-flag-6-1694638266-691 review-flag-7-1694638266-851 review-flag-alway-1694638263-571 review-flag-anywh-1694638264-237 review-flag-new-1694638263-340\\\">\\n\\t\\t\\t<div class=\\\"card__image card-img card__image--medium pt-md-4 mt-md-3\\\">\\n\\t\\t\\t<div class=\\\"embed-responsive embed-responsive-16by9\\\">\\n\\t\\t\\t\\t<img width=\\\"300\\\" height=\\\"169\\\" src=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Security_384075_Blog_241028-300x169.webp\\\" class=\\\"card-img embed-responsive-item img-object-cover wp-post-image\\\" alt=\\\"Practitioner and CISO collaboration in a security operations center.\\\" decoding=\\\"async\\\" srcset=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Security_384075_Blog_241028-300x169.webp 300w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Security_384075_Blog_241028-1024x575.webp 1024w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Security_384075_Blog_241028-768x432.webp 768w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Security_384075_Blog_241028-615x346.webp 615w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Security_384075_Blog_241028-336x189.webp 336w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Security_384075_Blog_241028-189x106.webp 189w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Security_384075_Blog_241028-630x354.webp 630w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Security_384075_Blog_241028.webp 1260w\\\" sizes=\\\"(max-width: 300px) 100vw, 300px\\\" \\\/>\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\t\\n\\t<div class=\\\"card__content card-body p-4 p-md-0\\\">\\n\\t\\t<div class=\\\"card__meta mb-g d-flex flex-wrap align-items-baseline\\\">\\n\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0\\\">\\n\\t\\t\\t\\t\\t<ul class=\\\"list-unstyled d-flex flex-wrap m-0\\\">\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/content-type\\\/industry-trends\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Industry trends\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tIndustry trends\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/topic\\\/small-and-medium-business\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Small and medium business\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"2\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tSmall and medium business\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<\\\/ul><\\\/div> \\t\\t\\t\\t\\t\\t<div class=\\\"card__meta-group d-inline-flex\\\">\\n\\t\\t\\t\\t<div class=\\\"card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t<span class=\\\"sr-only\\\">Published<\\\/span> <time datetime=\\\"2024-10-31T09:00:00-07:00\\\">Oct 31<\\\/time>\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__read-time d-sm-inline-flex align-items-center font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t\\t6 min read\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\n\\t\\t<h2 class=\\\"m-0 mb-g mb-lg-3 h3\\\">\\n\\t\\t\\t<a\\n\\t\\t\\t\\tclass=\\\"cta\\\"\\n\\t\\t\\t\\tdata-bi-cn=\\\"\\u200b\\u200b7 cybersecurity trends and tips for small and medium businesses to stay protected\\\"\\n\\t\\t\\t\\tdata-bi-id=\\\"136153\\\"\\n\\t\\t\\t\\tdata-bi-ct=\\\"title link\\\"\\n\\t\\t\\t\\tdata-bi-tn=\\\"search-result-card\\\"\\n\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/2024\\\/10\\\/31\\\/7-cybersecurity-trends-and-tips-for-small-and-medium-businesses-to-stay-protected\\\/\\\"\\n\\t\\t\\t>\\n\\t\\t\\t\\t<span>\\u200b\\u200b7 cybersecurity trends and tips for small and medium businesses to stay protected<\\\/span>\\u00a0<span class=\\\"glyph-prepend glyph-prepend-small glyph-prepend-chevron-right\\\" aria-hidden=\\\"true\\\"><\\\/span>\\n\\t\\t\\t<\\\/a>\\n\\t\\t<\\\/h2>\\n\\t\\t<p class=\\\"text-neutral-800\\\">\\n\\t\\t\\tThe challenges that small and midsize businesses (SMBs) face when it comes to security continue to increase as it becomes more difficult to keep up with sophisticated cyberthreats with limited resources or security expertise. Research conducted highlights the top seven SMB cybersecurity trends and steps that can be taken to stay protected.\\t\\t<\\\/p>\\n\\t<\\\/div>\\n\\n<\\\/article>\\n\"},{\"id\":136186,\"title\":\"Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files\",\"html\":\"<article\\n\\tid=\\\"post-136186\\\"\\n\\tclass=\\\"card material-card material-card--mobile h-100 is-entire-card-clickable post-136186 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-for-endpoint products-microsoft-defender-threat-intelligence products-microsoft-defender-xdr products-microsoft-sentinel threat-intelligence-attacker-techniques-tools-and-infrastructure threat-intelligence-threat-actors tag-blizzard tag-midnight-blizzard-nobelium review-flag-1694638265-576 review-flag-1694638271-781 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-lever-1694638263-909 review-flag-machi-1694638272-641 review-flag-new-1694638263-340\\\">\\n\\t\\t\\t<div class=\\\"card__image card-img card__image--medium pt-md-4 mt-md-3\\\">\\n\\t\\t\\t<div class=\\\"embed-responsive embed-responsive-16by9\\\">\\n\\t\\t\\t\\t<img width=\\\"300\\\" height=\\\"169\\\" src=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Screenshot-2024-10-31-at-12.13.59\\u202fPM-300x169.webp\\\" class=\\\"card-img embed-responsive-item img-object-cover wp-post-image\\\" alt=\\\"Midnight Blizzard icon\\\" decoding=\\\"async\\\" srcset=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Screenshot-2024-10-31-at-12.13.59\\u202fPM-300x169.webp 300w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Screenshot-2024-10-31-at-12.13.59\\u202fPM-1024x577.webp 1024w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Screenshot-2024-10-31-at-12.13.59\\u202fPM-768x432.webp 768w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Screenshot-2024-10-31-at-12.13.59\\u202fPM-1536x865.webp 1536w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Screenshot-2024-10-31-at-12.13.59\\u202fPM-2048x1153.webp 2048w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Screenshot-2024-10-31-at-12.13.59\\u202fPM-615x346.webp 615w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Screenshot-2024-10-31-at-12.13.59\\u202fPM-336x189.webp 336w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Screenshot-2024-10-31-at-12.13.59\\u202fPM-189x106.webp 189w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Screenshot-2024-10-31-at-12.13.59\\u202fPM-630x354.webp 630w\\\" sizes=\\\"(max-width: 300px) 100vw, 300px\\\" \\\/>\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\t\\n\\t<div class=\\\"card__content card-body p-4 p-md-0\\\">\\n\\t\\t<div class=\\\"card__meta mb-g d-flex flex-wrap align-items-baseline\\\">\\n\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0\\\">\\n\\t\\t\\t\\t\\t<ul class=\\\"list-unstyled d-flex flex-wrap m-0\\\">\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/content-type\\\/research\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Research\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tResearch\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/topic\\\/threat-intelligence\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Threat intelligence\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"2\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tThreat intelligence\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/products\\\/microsoft-defender-xdr\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Microsoft Defender XDR\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"3\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tMicrosoft Defender XDR\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/threat-intelligence\\\/threat-actors\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Threat actors\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"4\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tThreat actors\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<\\\/ul><\\\/div> \\t\\t\\t\\t\\t\\t<div class=\\\"card__meta-group d-inline-flex\\\">\\n\\t\\t\\t\\t<div class=\\\"card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t<span class=\\\"sr-only\\\">Published<\\\/span> <time datetime=\\\"2024-10-29T12:00:00-07:00\\\">Oct 29<\\\/time>\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__read-time d-sm-inline-flex align-items-center font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t\\t13 min read\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\n\\t\\t<h2 class=\\\"m-0 mb-g mb-lg-3 h3\\\">\\n\\t\\t\\t<a\\n\\t\\t\\t\\tclass=\\\"cta\\\"\\n\\t\\t\\t\\tdata-bi-cn=\\\"Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files\\\"\\n\\t\\t\\t\\tdata-bi-id=\\\"136186\\\"\\n\\t\\t\\t\\tdata-bi-ct=\\\"title link\\\"\\n\\t\\t\\t\\tdata-bi-tn=\\\"search-result-card\\\"\\n\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/2024\\\/10\\\/29\\\/midnight-blizzard-conducts-large-scale-spear-phishing-campaign-using-rdp-files\\\/\\\"\\n\\t\\t\\t>\\n\\t\\t\\t\\t<span>Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files<\\\/span>\\u00a0<span class=\\\"glyph-prepend glyph-prepend-small glyph-prepend-chevron-right\\\" aria-hidden=\\\"true\\\"><\\\/span>\\n\\t\\t\\t<\\\/a>\\n\\t\\t<\\\/h2>\\n\\t\\t<p class=\\\"text-neutral-800\\\">\\n\\t\\t\\tSince October 22, 2024, Microsoft Threat Intelligence has observed Russian threat actor Midnight Blizzard sending a series of highly targeted spear-phishing emails to individuals in government, academia, defense, non-governmental organizations, and other sectors. This activity is ongoing, and Microsoft will continue to investigate and provide updates as available.\\t\\t<\\\/p>\\n\\t<\\\/div>\\n\\n<\\\/article>\\n\"},{\"id\":136083,\"title\":\"Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action\",\"html\":\"<article\\n\\tid=\\\"post-136083\\\"\\n\\tclass=\\\"card material-card material-card--mobile h-100 is-entire-card-clickable post-136083 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-trends tag-ransomware review-flag-1694638271-781 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-4-1694638266-512 review-flag-5-1694638266-171 review-flag-6-1694638266-691 review-flag-8-1694638266-352 review-flag-new-1694638263-340\\\">\\n\\t\\t\\t<div class=\\\"card__image card-img card__image--medium pt-md-4 mt-md-3\\\">\\n\\t\\t\\t<div class=\\\"embed-responsive embed-responsive-16by9\\\">\\n\\t\\t\\t\\t<img width=\\\"300\\\" height=\\\"169\\\" src=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-300x169.webp\\\" class=\\\"card-img embed-responsive-item img-object-cover wp-post-image\\\" alt=\\\"A group of healthcare workers look at a tablet.\\\" decoding=\\\"async\\\" srcset=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-300x169.webp 300w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-1024x576.webp 1024w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-768x432.webp 768w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-615x346.webp 615w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-336x189.webp 336w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-189x106.webp 189w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report-630x354.webp 630w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/1260x708_MSFT_Security_Insider_Healthcare_Ransomware_Report.webp 1260w\\\" sizes=\\\"(max-width: 300px) 100vw, 300px\\\" \\\/>\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\t\\n\\t<div class=\\\"card__content card-body p-4 p-md-0\\\">\\n\\t\\t<div class=\\\"card__meta mb-g d-flex flex-wrap align-items-baseline\\\">\\n\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0\\\">\\n\\t\\t\\t\\t\\t<ul class=\\\"list-unstyled d-flex flex-wrap m-0\\\">\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/content-type\\\/research\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Research\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tResearch\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/topic\\\/threat-trends\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Threat trends\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"2\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tThreat trends\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<\\\/ul><\\\/div> \\t\\t\\t\\t\\t\\t<div class=\\\"card__meta-group d-inline-flex\\\">\\n\\t\\t\\t\\t<div class=\\\"card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t<span class=\\\"sr-only\\\">Published<\\\/span> <time datetime=\\\"2024-10-22T09:00:00-07:00\\\">Oct 22<\\\/time>\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__read-time d-sm-inline-flex align-items-center font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t\\t6 min read\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\n\\t\\t<h2 class=\\\"m-0 mb-g mb-lg-3 h3\\\">\\n\\t\\t\\t<a\\n\\t\\t\\t\\tclass=\\\"cta\\\"\\n\\t\\t\\t\\tdata-bi-cn=\\\"Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action\\\"\\n\\t\\t\\t\\tdata-bi-id=\\\"136083\\\"\\n\\t\\t\\t\\tdata-bi-ct=\\\"title link\\\"\\n\\t\\t\\t\\tdata-bi-tn=\\\"search-result-card\\\"\\n\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/2024\\\/10\\\/22\\\/microsoft-threat-intelligence-healthcare-ransomware-report-highlights-need-for-collective-industry-action\\\/\\\"\\n\\t\\t\\t>\\n\\t\\t\\t\\t<span>Microsoft Threat Intelligence healthcare ransomware report highlights need for collective industry action<\\\/span>\\u00a0<span class=\\\"glyph-prepend glyph-prepend-small glyph-prepend-chevron-right\\\" aria-hidden=\\\"true\\\"><\\\/span>\\n\\t\\t\\t<\\\/a>\\n\\t\\t<\\\/h2>\\n\\t\\t<p class=\\\"text-neutral-800\\\">\\n\\t\\t\\tHealthcare organizations are an attractive target for ransomware attacks. Read our latest blog post to learn why and get strategies to protect yourself from cyberthreats.\\t\\t<\\\/p>\\n\\t<\\\/div>\\n\\n<\\\/article>\\n\"},{\"id\":136092,\"title\":\"New macOS vulnerability, \\u201cHM Surf\\u201d, could lead to unauthorized data access\",\"html\":\"<article\\n\\tid=\\\"post-136092\\\"\\n\\tclass=\\\"card material-card material-card--mobile h-100 is-entire-card-clickable post-136092 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-for-endpoint threat-intelligence-vulnerabilities-and-exploits tag-macos review-flag-1694638265-576 review-flag-1694638271-781 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-4-1694638266-512 review-flag-5-1694638266-171 review-flag-6-1694638266-691 review-flag-7-1694638266-851 review-flag-alway-1694638263-571 review-flag-machi-1694638272-641 review-flag-new-1694638263-340\\\">\\n\\t\\t\\t<div class=\\\"card__image card-img card__image--medium pt-md-4 mt-md-3\\\">\\n\\t\\t\\t<div class=\\\"embed-responsive embed-responsive-16by9\\\">\\n\\t\\t\\t\\t<img width=\\\"300\\\" height=\\\"200\\\" src=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/macOS-vuln-300x200.webp\\\" class=\\\"card-img embed-responsive-item img-object-cover wp-post-image\\\" alt=\\\"Three professionals, a woman and two men, collaborating\\\" decoding=\\\"async\\\" srcset=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/macOS-vuln-300x200.webp 300w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/macOS-vuln-768x512.webp 768w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/macOS-vuln.webp 1024w\\\" sizes=\\\"(max-width: 300px) 100vw, 300px\\\" \\\/>\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\t\\n\\t<div class=\\\"card__content card-body p-4 p-md-0\\\">\\n\\t\\t<div class=\\\"card__meta mb-g d-flex flex-wrap align-items-baseline\\\">\\n\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0\\\">\\n\\t\\t\\t\\t\\t<ul class=\\\"list-unstyled d-flex flex-wrap m-0\\\">\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/content-type\\\/research\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Research\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tResearch\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/topic\\\/threat-intelligence\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Threat intelligence\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"2\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tThreat intelligence\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/products\\\/microsoft-defender\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Microsoft Defender\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"3\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tMicrosoft Defender\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/threat-intelligence\\\/vulnerabilities-and-exploits\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Vulnerabilities and exploits\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"4\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tVulnerabilities and exploits\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<\\\/ul><\\\/div> \\t\\t\\t\\t\\t\\t<div class=\\\"card__meta-group d-inline-flex\\\">\\n\\t\\t\\t\\t<div class=\\\"card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t<span class=\\\"sr-only\\\">Published<\\\/span> <time datetime=\\\"2024-10-17T09:00:00-07:00\\\">Oct 17<\\\/time>\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__read-time d-sm-inline-flex align-items-center font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t\\t9 min read\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\n\\t\\t<h2 class=\\\"m-0 mb-g mb-lg-3 h3\\\">\\n\\t\\t\\t<a\\n\\t\\t\\t\\tclass=\\\"cta\\\"\\n\\t\\t\\t\\tdata-bi-cn=\\\"New macOS vulnerability, \\u201cHM Surf\\u201d, could lead to unauthorized data access\\\"\\n\\t\\t\\t\\tdata-bi-id=\\\"136092\\\"\\n\\t\\t\\t\\tdata-bi-ct=\\\"title link\\\"\\n\\t\\t\\t\\tdata-bi-tn=\\\"search-result-card\\\"\\n\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/2024\\\/10\\\/17\\\/new-macos-vulnerability-hm-surf-could-lead-to-unauthorized-data-access\\\/\\\"\\n\\t\\t\\t>\\n\\t\\t\\t\\t<span>New macOS vulnerability, \\u201cHM Surf\\u201d, could lead to unauthorized data access<\\\/span>\\u00a0<span class=\\\"glyph-prepend glyph-prepend-small glyph-prepend-chevron-right\\\" aria-hidden=\\\"true\\\"><\\\/span>\\n\\t\\t\\t<\\\/a>\\n\\t\\t<\\\/h2>\\n\\t\\t<p class=\\\"text-neutral-800\\\">\\n\\t\\t\\tMicrosoft Threat Intelligence uncovered a macOS vulnerability that could potentially allow an attacker to bypass the operating system\\u2019s Transparency, Consent, and Control (TCC) technology and gain unauthorized access to a user\\u2019s protected data.\\t\\t<\\\/p>\\n\\t<\\\/div>\\n\\n<\\\/article>\\n\"},{\"id\":0,\"title\":\"Promo\",\"html\":\"<div class=\\\"promo-banner promo-in-loop my-4 post-130064 ms-promo type-ms-promo status-publish hentry content-type-best-practices content-type-events content-type-industry-trends content-type-news content-type-research topic-ai-and-machine-learning topic-analyst-reports topic-cloud-security topic-email-security topic-endpoint-security topic-iot-security topic-misa topic-multifactor-authentication topic-network-security topic-risk-management topic-security-management topic-security-operations topic-siem-and-xdr topic-zero-trust products-microsoft-sentinel\\\"><div class=\\\"wp-block-msxcm-cta-block\\\" data-moray data-bi-an=\\\"CTA Block\\\">\\n\\t<div class=\\\"card d-block mx-ng mx-md-0\\\">\\n\\t\\t<div class=\\\"row no-gutters material-color-brand-dark\\\">\\n\\n\\t\\t\\t\\n\\t\\t\\t<div class=\\\"d-flex col-md\\\">\\n\\t\\t\\t\\t<div class=\\\"card-body align-self-center p-4 p-md-5\\\">\\n\\t\\t\\t\\t\\t<h2>Modernize your Security Operations Center with Microsoft Sentinel<\\\/h2>\\n\\n\\t\\t\\t\\t\\t<div class=\\\"mb-3\\\">\\n\\t\\t\\t\\t\\t\\t<p>Microsoft Sentinel is a cloud-native SIEM solution powered by AI and automation that delivers intelligent security analytics across your entire enterprise.<\\\/p>\\n\\t\\t\\t\\t\\t<\\\/div>\\n\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<div class=\\\"link-group\\\">\\n\\t\\t\\t\\t\\t\\t\\t<a href=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/business\\\/siem-and-xdr\\\/microsoft-sentinel\\\" class=\\\"btn btn-primary bg-body text-body\\\" >\\n\\t\\t\\t\\t\\t\\t\\t\\t<span>Learn more<\\\/span>\\n\\t\\t\\t\\t\\t\\t\\t\\t<span class=\\\"glyph-append glyph-append-chevron-right glyph-append-xsmall\\\"><\\\/span>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t<\\\/div>\\n\\n\\t\\t\\t\\t\\t\\t\\t<div class=\\\"col-md-4\\\">\\n\\t\\t\\t\\t\\t<img decoding=\\\"async\\\" width=\\\"1024\\\" height=\\\"692\\\" src=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Microsoft-Security-illustration-metaphors_211101_illus-pillar-end-visibility_LtBlue-1024x692.webp\\\" class=\\\"card-img img-object-cover\\\" alt=\\\"\\\" srcset=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Microsoft-Security-illustration-metaphors_211101_illus-pillar-end-visibility_LtBlue-1024x692.webp 1024w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Microsoft-Security-illustration-metaphors_211101_illus-pillar-end-visibility_LtBlue-300x203.webp 300w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Microsoft-Security-illustration-metaphors_211101_illus-pillar-end-visibility_LtBlue-768x519.webp 768w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Microsoft-Security-illustration-metaphors_211101_illus-pillar-end-visibility_LtBlue-1536x1038.webp 1536w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Microsoft-Security-illustration-metaphors_211101_illus-pillar-end-visibility_LtBlue-2048x1384.webp 2048w\\\" sizes=\\\"(max-width: 1024px) 100vw, 1024px\\\" \\\/>\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t<\\\/div>\\n\\t<\\\/div>\\n<\\\/div>\\n<\\\/div><!-- args: {\\\"tax_query\\\":[{\\\"taxonomy\\\":\\\"content-type\\\",\\\"field\\\":\\\"term_id\\\",\\\"terms\\\":3663}],\\\"orderby\\\":\\\"date\\\",\\\"offset\\\":1} context: {\\\"is_search\\\":true,\\\"page\\\":1,\\\"shown\\\":1}-->\"},{\"id\":135958,\"title\":\"File hosting services misused for identity phishing\",\"html\":\"<article\\n\\tid=\\\"post-135958\\\"\\n\\tclass=\\\"card material-card material-card--mobile h-100 is-entire-card-clickable post-135958 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-experts-for-hunting products-microsoft-defender-experts-for-xdr products-microsoft-defender-for-cloud-apps products-microsoft-defender-for-office-365 products-microsoft-defender-xdr products-microsoft-entra products-microsoft-entra-id-protection products-microsoft-security-experts products-microsoft-sentinel threat-intelligence-attacker-techniques-tools-and-infrastructure threat-intelligence-business-email-compromise threat-intelligence-cybercrime threat-intelligence-social-engineering-phishing tag-adversary-in-the-middle tag-credential-theft tag-token-theft review-flag-1694638265-576 review-flag-1694638271-781 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-4-1694638266-512 review-flag-5-1694638266-171 review-flag-6-1694638266-691 review-flag-and-o-1694638265-458 review-flag-lever-1694638263-909 review-flag-new-1694638263-340\\\">\\n\\t\\t\\t<div class=\\\"card__image card-img card__image--medium pt-md-4 mt-md-3\\\">\\n\\t\\t\\t<div class=\\\"embed-responsive embed-responsive-16by9\\\">\\n\\t\\t\\t\\t<img width=\\\"300\\\" height=\\\"200\\\" src=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/blog3-300x200.jpg\\\" class=\\\"card-img embed-responsive-item img-object-cover wp-post-image\\\" alt=\\\"Man in coffee shop at laptop\\\" decoding=\\\"async\\\" srcset=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/blog3-300x200.jpg 300w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/blog3-1024x682.jpg 1024w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/blog3-768x512.jpg 768w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/blog3-1536x1024.jpg 1536w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/blog3-2048x1365.jpg 2048w\\\" sizes=\\\"(max-width: 300px) 100vw, 300px\\\" \\\/>\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\t\\n\\t<div class=\\\"card__content card-body p-4 p-md-0\\\">\\n\\t\\t<div class=\\\"card__meta mb-g d-flex flex-wrap align-items-baseline\\\">\\n\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0\\\">\\n\\t\\t\\t\\t\\t<ul class=\\\"list-unstyled d-flex flex-wrap m-0\\\">\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/content-type\\\/research\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Research\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tResearch\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/topic\\\/threat-intelligence\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Threat intelligence\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"2\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tThreat intelligence\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/products\\\/microsoft-defender-xdr\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Microsoft Defender XDR\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"3\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tMicrosoft Defender XDR\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/threat-intelligence\\\/business-email-compromise\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Business email compromise\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"4\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tBusiness email compromise\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<\\\/ul><\\\/div> \\t\\t\\t\\t\\t\\t<div class=\\\"card__meta-group d-inline-flex\\\">\\n\\t\\t\\t\\t<div class=\\\"card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t<span class=\\\"sr-only\\\">Published<\\\/span> <time datetime=\\\"2024-10-08T09:00:00-07:00\\\">Oct 8<\\\/time>\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__read-time d-sm-inline-flex align-items-center font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t\\t9 min read\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\n\\t\\t<h2 class=\\\"m-0 mb-g mb-lg-3 h3\\\">\\n\\t\\t\\t<a\\n\\t\\t\\t\\tclass=\\\"cta\\\"\\n\\t\\t\\t\\tdata-bi-cn=\\\"File hosting services misused for identity phishing\\\"\\n\\t\\t\\t\\tdata-bi-id=\\\"135958\\\"\\n\\t\\t\\t\\tdata-bi-ct=\\\"title link\\\"\\n\\t\\t\\t\\tdata-bi-tn=\\\"search-result-card\\\"\\n\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/2024\\\/10\\\/08\\\/file-hosting-services-misused-for-identity-phishing\\\/\\\"\\n\\t\\t\\t>\\n\\t\\t\\t\\t<span>File hosting services misused for identity phishing<\\\/span>\\u00a0<span class=\\\"glyph-prepend glyph-prepend-small glyph-prepend-chevron-right\\\" aria-hidden=\\\"true\\\"><\\\/span>\\n\\t\\t\\t<\\\/a>\\n\\t\\t<\\\/h2>\\n\\t\\t<p class=\\\"text-neutral-800\\\">\\n\\t\\t\\tSince mid-April 2024, Microsoft has observed an increase in defense evasion tactics used in campaigns abusing file hosting services like SharePoint, OneDrive, and Dropbox. These campaigns use sophisticated techniques to perform social engineering, evade detection, and compromise identities, and include business email compromise (BEC) attacks.\\t\\t<\\\/p>\\n\\t<\\\/div>\\n\\n<\\\/article>\\n\"},{\"id\":135823,\"title\":\"Storm-0501: Ransomware attacks expanding to hybrid cloud environments\",\"html\":\"<article\\n\\tid=\\\"post-135823\\\"\\n\\tclass=\\\"card material-card material-card--mobile h-100 is-entire-card-clickable post-135823 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-for-cloud-apps products-microsoft-defender-for-endpoint products-microsoft-defender-for-identity products-microsoft-defender-threat-intelligence products-microsoft-defender-vulnerability-management products-microsoft-defender-xdr products-microsoft-sentinel threat-intelligence-attacker-techniques-tools-and-infrastructure threat-intelligence-cloud-threats threat-intelligence-cybercrime threat-intelligence-ransomware threat-intelligence-threat-actors tag-credential-theft tag-ransomware tag-ransomware-as-a-service tag-storm review-flag-1694638265-576 review-flag-1694638265-83 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-alway-1694638263-571 review-flag-disable review-flag-disabled review-flag-infor-1694638272-144 review-flag-lever-1694638263-909 review-flag-new-1694638263-340 review-flag-partn-1694638263-177 review-flag-vm-1694638271-244\\\">\\n\\t\\t\\t<div class=\\\"card__image card-img card__image--medium pt-md-4 mt-md-3\\\">\\n\\t\\t\\t<div class=\\\"embed-responsive embed-responsive-16by9\\\">\\n\\t\\t\\t\\t<img width=\\\"300\\\" height=\\\"200\\\" src=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Storm-0501-300x200.webp\\\" class=\\\"card-img embed-responsive-item img-object-cover wp-post-image\\\" alt=\\\"Two engineers wearing safety goggles work on a desktop PC at a manufacturing plant.\\\" decoding=\\\"async\\\" srcset=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Storm-0501-300x200.webp 300w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Storm-0501-768x512.webp 768w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Storm-0501.webp 864w\\\" sizes=\\\"(max-width: 300px) 100vw, 300px\\\" \\\/>\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\t\\n\\t<div class=\\\"card__content card-body p-4 p-md-0\\\">\\n\\t\\t<div class=\\\"card__meta mb-g d-flex flex-wrap align-items-baseline\\\">\\n\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0\\\">\\n\\t\\t\\t\\t\\t<ul class=\\\"list-unstyled d-flex flex-wrap m-0\\\">\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/content-type\\\/research\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Research\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tResearch\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/topic\\\/threat-intelligence\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Threat intelligence\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"2\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tThreat intelligence\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/products\\\/microsoft-defender\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Microsoft Defender\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"3\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tMicrosoft Defender\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/threat-intelligence\\\/attacker-techniques-tools-and-infrastructure\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Attacker techniques, tools, and infrastructure\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"4\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tAttacker techniques, tools, and infrastructure\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<\\\/ul><\\\/div> \\t\\t\\t\\t\\t\\t<div class=\\\"card__meta-group d-inline-flex\\\">\\n\\t\\t\\t\\t<div class=\\\"card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t<span class=\\\"sr-only\\\">Published<\\\/span> <time datetime=\\\"2024-09-26T10:00:00-07:00\\\">Sep 26<\\\/time>\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__read-time d-sm-inline-flex align-items-center font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t\\t20 min read\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\n\\t\\t<h2 class=\\\"m-0 mb-g mb-lg-3 h3\\\">\\n\\t\\t\\t<a\\n\\t\\t\\t\\tclass=\\\"cta\\\"\\n\\t\\t\\t\\tdata-bi-cn=\\\"Storm-0501: Ransomware attacks expanding to hybrid cloud environments\\\"\\n\\t\\t\\t\\tdata-bi-id=\\\"135823\\\"\\n\\t\\t\\t\\tdata-bi-ct=\\\"title link\\\"\\n\\t\\t\\t\\tdata-bi-tn=\\\"search-result-card\\\"\\n\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/2024\\\/09\\\/26\\\/storm-0501-ransomware-attacks-expanding-to-hybrid-cloud-environments\\\/\\\"\\n\\t\\t\\t>\\n\\t\\t\\t\\t<span>Storm-0501: Ransomware attacks expanding to hybrid cloud environments<\\\/span>\\u00a0<span class=\\\"glyph-prepend glyph-prepend-small glyph-prepend-chevron-right\\\" aria-hidden=\\\"true\\\"><\\\/span>\\n\\t\\t\\t<\\\/a>\\n\\t\\t<\\\/h2>\\n\\t\\t<p class=\\\"text-neutral-800\\\">\\n\\t\\t\\tMicrosoft has observed the threat actor tracked as Storm-0501 launching a multi-staged attack where they compromised hybrid cloud environments and performed lateral movement from on-premises to cloud environment, leading to data exfiltration, credential theft, tampering, persistent backdoor access, and ransomware deployment.\\t\\t<\\\/p>\\n\\t<\\\/div>\\n\\n<\\\/article>\\n\"},{\"id\":135584,\"title\":\"North Korean threat actor Citrine Sleet exploiting Chromium zero-day\",\"html\":\"<article\\n\\tid=\\\"post-135584\\\"\\n\\tclass=\\\"card material-card material-card--mobile h-100 is-entire-card-clickable post-135584 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-for-endpoint products-microsoft-defender-threat-intelligence products-microsoft-sentinel threat-intelligence-attacker-techniques-tools-and-infrastructure threat-intelligence-threat-actors threat-intelligence-vulnerabilities-and-exploits tag-sleet tag-state-sponsored-threat-actor review-flag-1694638265-576 review-flag-2-1694638266-864 review-flag-machi-1694638272-641 review-flag-new-1694638263-340\\\">\\n\\t\\t\\t<div class=\\\"card__image card-img card__image--medium pt-md-4 mt-md-3\\\">\\n\\t\\t\\t<div class=\\\"embed-responsive embed-responsive-16by9\\\">\\n\\t\\t\\t\\t<img width=\\\"300\\\" height=\\\"200\\\" src=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/CitrineSleet-blog-n-300x200.webp\\\" class=\\\"card-img embed-responsive-item img-object-cover wp-post-image\\\" alt=\\\"\\\" decoding=\\\"async\\\" srcset=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/CitrineSleet-blog-n-300x200.webp 300w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/CitrineSleet-blog-n-1024x683.webp 1024w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/CitrineSleet-blog-n-768x512.webp 768w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/CitrineSleet-blog-n-1536x1024.webp 1536w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/CitrineSleet-blog-n.webp 1728w\\\" sizes=\\\"(max-width: 300px) 100vw, 300px\\\" \\\/>\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\t\\n\\t<div class=\\\"card__content card-body p-4 p-md-0\\\">\\n\\t\\t<div class=\\\"card__meta mb-g d-flex flex-wrap align-items-baseline\\\">\\n\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0\\\">\\n\\t\\t\\t\\t\\t<ul class=\\\"list-unstyled d-flex flex-wrap m-0\\\">\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/content-type\\\/research\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Research\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tResearch\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/topic\\\/threat-intelligence\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Threat intelligence\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"2\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tThreat intelligence\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/products\\\/microsoft-defender\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Microsoft Defender\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"3\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tMicrosoft Defender\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/threat-intelligence\\\/vulnerabilities-and-exploits\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Vulnerabilities and exploits\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"4\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tVulnerabilities and exploits\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<\\\/ul><\\\/div> \\t\\t\\t\\t\\t\\t<div class=\\\"card__meta-group d-inline-flex\\\">\\n\\t\\t\\t\\t<div class=\\\"card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t<span class=\\\"sr-only\\\">Published<\\\/span> <time datetime=\\\"2024-08-30T09:00:00-07:00\\\">Aug 30<\\\/time>\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__read-time d-sm-inline-flex align-items-center font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t\\t9 min read\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\n\\t\\t<h2 class=\\\"m-0 mb-g mb-lg-3 h3\\\">\\n\\t\\t\\t<a\\n\\t\\t\\t\\tclass=\\\"cta\\\"\\n\\t\\t\\t\\tdata-bi-cn=\\\"North Korean threat actor Citrine Sleet exploiting Chromium zero-day\\\"\\n\\t\\t\\t\\tdata-bi-id=\\\"135584\\\"\\n\\t\\t\\t\\tdata-bi-ct=\\\"title link\\\"\\n\\t\\t\\t\\tdata-bi-tn=\\\"search-result-card\\\"\\n\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/2024\\\/08\\\/30\\\/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day\\\/\\\"\\n\\t\\t\\t>\\n\\t\\t\\t\\t<span>North Korean threat actor Citrine Sleet exploiting Chromium zero-day<\\\/span>\\u00a0<span class=\\\"glyph-prepend glyph-prepend-small glyph-prepend-chevron-right\\\" aria-hidden=\\\"true\\\"><\\\/span>\\n\\t\\t\\t<\\\/a>\\n\\t\\t<\\\/h2>\\n\\t\\t<p class=\\\"text-neutral-800\\\">\\n\\t\\t\\tMicrosoft identified a North Korean threat actor exploiting a zero-day vulnerability in Chromium (CVE-2024-7971) to gain remote code execution (RCE) in the Chromium renderer process. Our assessment of ongoing analysis and observed infrastructure attributes this activity to Citrine Sleet, a North Korean threat actor that commonly targets the cryptocurrency sector for financial gain.\\t\\t<\\\/p>\\n\\t<\\\/div>\\n\\n<\\\/article>\\n\"},{\"id\":135563,\"title\":\"Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations\",\"html\":\"<article\\n\\tid=\\\"post-135563\\\"\\n\\tclass=\\\"card material-card material-card--mobile h-100 is-entire-card-clickable post-135563 post type-post status-publish format-standard has-post-thumbnail hentry content-type-research topic-threat-intelligence products-microsoft-defender products-microsoft-defender-for-cloud-apps products-microsoft-defender-for-endpoint products-microsoft-defender-for-identity products-microsoft-defender-xdr products-microsoft-sentinel threat-intelligence-attacker-techniques-tools-and-infrastructure threat-intelligence-threat-actors tag-sandstorm tag-state-sponsored-threat-actor review-flag-1694638265-576 review-flag-1694638265-310 review-flag-1694638265-83 review-flag-1-1694638265-354 review-flag-2-1694638266-864 review-flag-3-1694638266-241 review-flag-5-1694638266-171 review-flag-alway-1694638263-571 review-flag-lever-1694638263-909 review-flag-new-1694638263-340\\\">\\n\\t\\t\\t<div class=\\\"card__image card-img card__image--medium pt-md-4 mt-md-3\\\">\\n\\t\\t\\t<div class=\\\"embed-responsive embed-responsive-16by9\\\">\\n\\t\\t\\t\\t<img width=\\\"300\\\" height=\\\"169\\\" src=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Hexagon-overlay-300x169.webp\\\" class=\\\"card-img embed-responsive-item img-object-cover wp-post-image\\\" alt=\\\"A photo of a male standing in front of a computer\\\" decoding=\\\"async\\\" srcset=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Hexagon-overlay-300x169.webp 300w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Hexagon-overlay-1024x576.webp 1024w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Hexagon-overlay-768x432.webp 768w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Hexagon-overlay-1536x864.webp 1536w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Hexagon-overlay-2048x1151.webp 2048w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Hexagon-overlay-615x346.webp 615w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Hexagon-overlay-336x189.webp 336w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Hexagon-overlay-189x106.webp 189w, https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Hexagon-overlay-630x354.webp 630w\\\" sizes=\\\"(max-width: 300px) 100vw, 300px\\\" \\\/>\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\t\\n\\t<div class=\\\"card__content card-body p-4 p-md-0\\\">\\n\\t\\t<div class=\\\"card__meta mb-g d-flex flex-wrap align-items-baseline\\\">\\n\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__categories d-inline-flex align-items-center w-100 w-sm-auto mb-g mb-sm-0\\\">\\n\\t\\t\\t\\t\\t<ul class=\\\"list-unstyled d-flex flex-wrap m-0\\\">\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/content-type\\\/research\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Research\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tResearch\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/topic\\\/threat-intelligence\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Threat intelligence\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"2\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tThreat intelligence\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/products\\\/microsoft-defender-xdr\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Microsoft Defender XDR\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"3\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tMicrosoft Defender XDR\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<li>\\n\\t\\t\\t\\t\\t\\t\\t\\t<a\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tclass=\\\"font-weight-bold small\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/threat-intelligence\\\/threat-actors\\\/\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-id=\\\"1\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-cn=\\\"Threat actors\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-ct=\\\"post categories\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tdata-bi-slot=\\\"4\\\"\\n\\t\\t\\t\\t\\t\\t\\t\\t>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\tThreat actors\\t\\t\\t\\t\\t\\t\\t\\t<\\\/a>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/li>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t\\t<\\\/ul><\\\/div> \\t\\t\\t\\t\\t\\t<div class=\\\"card__meta-group d-inline-flex\\\">\\n\\t\\t\\t\\t<div class=\\\"card__date d-sm-inline-flex align-items-center w-sm-auto font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t<span class=\\\"sr-only\\\">Published<\\\/span> <time datetime=\\\"2024-08-28T08:00:00-07:00\\\">Aug 28<\\\/time>\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t\\t\\t<div class=\\\"card__read-time d-sm-inline-flex align-items-center font-weight-bold small\\\">\\n\\t\\t\\t\\t\\t\\t14 min read\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t\\t\\t\\t\\t\\t<\\\/div>\\n\\t\\t<\\\/div>\\n\\n\\t\\t<h2 class=\\\"m-0 mb-g mb-lg-3 h3\\\">\\n\\t\\t\\t<a\\n\\t\\t\\t\\tclass=\\\"cta\\\"\\n\\t\\t\\t\\tdata-bi-cn=\\\"Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations\\\"\\n\\t\\t\\t\\tdata-bi-id=\\\"135563\\\"\\n\\t\\t\\t\\tdata-bi-ct=\\\"title link\\\"\\n\\t\\t\\t\\tdata-bi-tn=\\\"search-result-card\\\"\\n\\t\\t\\t\\thref=\\\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/2024\\\/08\\\/28\\\/peach-sandstorm-deploys-new-custom-tickler-malware-in-long-running-intelligence-gathering-operations\\\/\\\"\\n\\t\\t\\t>\\n\\t\\t\\t\\t<span>Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations<\\\/span>\\u00a0<span class=\\\"glyph-prepend glyph-prepend-small glyph-prepend-chevron-right\\\" aria-hidden=\\\"true\\\"><\\\/span>\\n\\t\\t\\t<\\\/a>\\n\\t\\t<\\\/h2>\\n\\t\\t<p class=\\\"text-neutral-800\\\">\\n\\t\\t\\tBetween April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which we named Tickler.\\t\\t<\\\/p>\\n\\t<\\\/div>\\n\\n<\\\/article>\\n\"}],\"posts_per_page\":12,\"post_count\":12,\"max_num_pages\":29}","archiveSlug":"","earliestPostDate":"2006-05-05","taxonomy":{"slug":"research","taxonomy":"content-type","term_id":3663},"i18n":{"expand":"+ View all","searchToggle":"+ Search all","collapse":"Collapse","loadingStart":"Loading additional posts. Please wait.","loadingEnd":"Loading additional posts complete.","searchTitle":"Search","removeFilter":"Remove filter","noResultsLabel":"Nothing found","noResultsText":"Sorry, but nothing matched your search terms. Please try again with some different keywords.","duetDatePicker":{"buttonLabel":"Choose date","placeholder":"MM\/DD\/YY","selectedDateMessage":"Selected date is","prevMonthLabel":"Previous month","nextMonthLabel":"Next month","monthSelectLabel":"Month","yearSelectLabel":"Year","closeLabel":"Close window","calendarHeading":"Choose a date","startLabel":"Start Date","endLabel":"End Date","startDateDesc":"Enter a starting date in MM\/DD\/YYYY format.","endDateDesc":"Enter an ending date in MM\/DD\/YYYY format.","applyRangeLabel":"Apply","dayNames":["Sunday","Monday","Tuesday","Wednesday","Thursday","Friday","Saturday"],"monthNames":["January","February","March","April","May","June","July","August","September","October","November","December"],"monthNamesShort":["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"]}}}; /* ]]> */ </script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-content/plugins/microsoft-faceted-search/dist/js/search.js?ver=1732562250" id="ms_search_scripts-js"></script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-content/themes/security-blog/dist/js/moray-scripts.js?ver=248d31e3864eb5a3d005" id="mse-moray-scripts-js"></script> <script type="text/javascript" id="frontend-js-extra"> /* <![CDATA[ */ var securityBlog = {"i18n":{"more":"more","less":"less","more_tags":"View more tags","less_tags":"View less tags"}}; /* ]]> */ </script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-content/themes/security-blog/dist/js/frontend.js?ver=1b4d96d0f0d4585f3c62" id="frontend-js"></script> <script type="text/javascript" id="msx-frontend-js-extra"> /* <![CDATA[ */ var msx = {"darkModeToggle":"1","i18n":{"loadMore":"Load more","loading":"Loading","loadingStart":"Loading more. Please wait.","loadingEnd":"Loading complete. %d items added.","loadMoreAriaLabel":"Load more results","light":"Switch the site theme to: dark","dark":"Switch the site theme to: light","toggleOptionLight":"Light","toggleOptionDark":"Dark"}}; /* ]]> */ </script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-content/themes/xtheme/dist/js/frontend.js?ver=1732562319" id="msx-frontend-js"></script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-content/plugins/cloud-marketing-modules/dist/js/frontend.js?ver=1732562297" id="msxcm-frontend-js"></script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-content/plugins/oembeds/assets/js/vendor/focus-within.js?ver=1.3.10" id="ms-oembed-focus-within-js"></script> <script type="text/javascript" id="ms-oembed-gif-script-js-extra"> /* <![CDATA[ */ var msgifs = {"play":"Play animated gif","pause":"Pause animated gif"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-content/plugins/oembeds/dist/js/ms-oembed-lib-gif.js?ver=76f838e8af84044e0283" id="ms-oembed-gif-script-js"></script> <script type="text/javascript" id="microsoft-uhf-js-extra"> /* <![CDATA[ */ var microsoftUhfSettings = {"homePath":"\/en-us\/security\/blog\/","loginUrl":"","logoutUrl":"","scripts":[],"inline":[]}; /* ]]> */ </script> <script type="text/javascript" src="https://www.microsoft.com/en-us/security/blog/wp-content/plugins/microsoft-uhf/assets/microsoft-uhf.js?ver=0.5.3" id="microsoft-uhf-js"></script> <!-- JSLL tracking --> <script> // 1DS initialization const analytics = new oneDS.ApplicationInsights(); var config = { instrumentationKey: "cb68b8f590184975aa5eb4ed576fb074-e666ac9b-fa31-4339-8b9c-775f4bae31f3-6978", propertyConfiguration: { gpcDataSharingOptIn: ( typeof GPC_DataSharingOptIn !== "undefined" ) ? GPC_DataSharingOptIn : true, callback: { userConsentDetails: ( typeof siteConsent !== "undefined" ) ? siteConsent.getConsent : WcpConsent.siteConsent }, }, webAnalyticsConfiguration:{ coreData: {"pageName":"Content type: Research","pageType":"Content type: Research"}, urlCollectQuery: true, urlCollectHash: true, autoCapture: { scroll: true, pageView: true, onLoad: true, onUnload: true, click: true, scroll: true, resize: true, jsError: true } } }; // Initialize OneDS SDK analytics.initialize( config, [] ); </script> </body> </html>