Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Microsoft

Below you will find reports with the source of “Microsoft”

image from The 2023 Cybersecurity Research Report

The 2023 Cybersecurity Research Report

The objective with this research was to gather the perspectives and priorities of global IT leaders who are considering leveraging cybersecurity best practices to spur growth in their organizations. Through the survey, we were able to pinpoint areas of investment, operational challenges and potential threats while gauging an outlook on the future.

(more available)
Added: October 18, 2023
image from State of Play Report

State of Play Report

The United Kingdom’s National Cyber Security Centre (NCSC) found that cyberattacks against sports organizations are increasingly common, with 70% of those surveyed experiencing at least one attack per year, significantly higher than the average across businesses in the United Kingdom. In this edition we offer first hand learnings about how threat actors assess and infiltrate these environments across venues, teams, and critical infrastructure around the event itself.

(more available)
Added: October 10, 2023
image from 2023 Microsoft Digital Defense Report

2023 Microsoft Digital Defense Report

In this fourth annual edition of the Microsoft Digital Defense Report, we draw on our unique vantage point to share insights on how the threat landscape has evolved and discuss the shared opportunities and challenges we all face in securing a resilient online ecosystem which the world can depend on.

(more available)
Added: October 10, 2023
image from Microsoft Digital Defense Report 2022

Microsoft Digital Defense Report 2022

In the report’s first chapter, we focus on activities of cybercriminals, followed by nation states threats in chapter two. Both groups have greatly increased the sophistication on their attacks which has dramatically increased the impact of their actions.

(more available)
Added: November 7, 2022
image from Cyber Signals

Cyber Signals

A cyberthreat intelligence brief informed by the latest Microsoft threat data and research. This content offers an expert perspective into the current threat landscape, discussing trending tactics, techniques and strategies used by the world’s most prolific threat actors.

(more available)
Added: February 9, 2022
image from Microsoft Digital Defense Report

Microsoft Digital Defense Report

This report looks at cybercrime in 2020, going into the changes in cybercrime, nationwide threats, security involving remote work, and how to improve security.

(more available)
Added: December 1, 2020
image from Microsoft Security Intelligence Report: Volume 24

Microsoft Security Intelligence Report: Volume 24

This report provides insights culled from a year of security data analysis and hands-on lessons learned. Data analyzed includes the 6.5 trillion threat signals that go through the Microsoft cloud every day and the research and realworld experiences from our thousands of security researchers and responders around the world. In 2018, attackers used a variety of dirty tricks, both new (coin mining) and old (phishing), in their ongoing quest to steal data and resources from customers and organizations. Hybrid attacks, like the Ursnif campaign, blended social and technical approaches. As defenders got smarter against ransomware, a loud and disruptive form of attack, criminals pivoted to the more “stealth”, but still profitable, coin-miners.

(more available)
Added: July 10, 2019
image from Microsoft Security Intelligence Report

Microsoft Security Intelligence Report

From The Report, “What you’re reading are insights culled from a year of security data analysis and hands-on lessons learned. Data analyzed includes the 6.5 trillion threat signals that go through the Microsoft cloud every day and the research and realworld experiences from our thousands of security researchers and responders around the world. In 2018, attackers used a variety of dirty tricks, both new (coin mining) and old (phishing), in their ongoing quest to steal data and resources from customers and organizations. Hybrid attacks, like the Ursnif campaign, blended social and technical approaches. As defenders got smarter against ransomware, a loud and disruptive form of attack, criminals pivoted to the more “stealth”, but still profitable, coin-miners.”

(more available)
Added: March 1, 2019
image from PLATINUM continues to evolve, find ways to maintain invisibility

PLATINUM continues to evolve, find ways to maintain invisibility

Microsoft has come across an evolution of PLATINUM’s file-transfer tool, one that uses the Intel® Active Management Technology (AMT) Serial-over-LAN (SOL) channel for communication. This channel works independently of the operating system (OS), rendering any communication over it invisible to firewall and network monitoring applications running on the host device. Until this incident, no malware had been discovered misusing the AMT SOL feature for communication.

(more available)
Added: November 15, 2018
image from Microsoft Security Intelligence Report Volume 22

Microsoft Security Intelligence Report Volume 22

This is the 22nd edition of the Microsoft Security Intelligence Report. In this report, they have organized data sets into two categories, cloud and endpoint. They are sharing data about a shorter time period, one quarter.

(more available)
Added: October 26, 2018
image from Security Intelligence Report Volume 21

Security Intelligence Report Volume 21

This report focuses on software vulnerabilities, software vulnerability exploits, malware, and unwanted software. It is the hope that readers find the data, insights, and guidance provided in this report useful in helping them protect their organizations, software, and users.

(more available)
Added: October 25, 2018
image from Security Intelligence Report Volume 20

Security Intelligence Report Volume 20

This report focuses on software vulnerabilities, software vulnerability exploits, malware, and unwanted software. It is the hope that readers find the data, insights, and guidance provided in this report useful in helping them protect their organizations, software, and users.

(more available)
Added: October 24, 2018
image from Security Intelligence Report Volume 19

Security Intelligence Report Volume 19

This report focuses on software vulnerabilities, software vulnerability exploits, malware, and unwanted software. It is the hope that readers find the data, insights, and guidance provided in this report useful in helping them protect their organizations, software, and users.

(more available)
Added: October 23, 2018
image from Incident Response Reference Guide

Incident Response Reference Guide

This Guide aims to help businesses have a good response to cyber threat incidents.

Added: October 22, 2018
image from Microsoft As A Trusted Advisor And Partner On Cyber Resilience

Microsoft As A Trusted Advisor And Partner On Cyber Resilience

This whitepaper provides information about developing your organization’s cyber resiliance.

Added: October 21, 2018
image from By the Numbers: Global Cyber Risk Perception Survey February 2018

By the Numbers: Global Cyber Risk Perception Survey February 2018

This is a unqiue report in that two leaders in two seperate industries collaborated out of the mutual concern regarding the state of cybersecurity in the global economy and the knowledge that cyber risk cannot be compartmentalized by industry, company,size, or simliar measures.

(more available)
Added: October 15, 2018
© Cyentia Institute 2025
Library updated: July 3, 2025 00:08 UTC (build b1d7be4)