舌头上有齿痕是什么原因| 拉肚子适合吃什么| 艾滋病前期有什么症状| 怀孕应该注意什么| 头发为什么会分叉| 夏天的诗句有什么| 煮玉米加什么才会香甜| nec医学上是什么意思| 胃造影和胃镜有什么区别| 上报是什么意思| b3维生素又叫什么| 外婆菜是什么菜| 老年人流鼻血是什么原因| 湿气重会有什么症状| 玛丽苏什么意思| 一个虫一个离念什么| 石斛配什么泡水喝好| 为什么第一次没有出血| 看头发应该挂什么科| 刮腻子是什么意思| 圆是什么结构| 低密度脂蛋白高的原因是什么| 上吐下泻是什么原因| 青核桃皮的功效与作用是什么| 不想要孩子用什么办法最好| 静脉曲张是什么原因引起的| 手指上的月牙代表什么| 拉肚子为什么憋不住| 减肥可以吃什么主食| 水乳是什么| 荥在中医读什么| 肺部斑片状高密度影是什么意思| 新生儿屁多是什么原因| 红加绿是什么颜色| 黄连膏有什么功效和作用| 茄子什么人不能吃| 什么是菜花状疣图片| 黑糖和红糖有什么区别| 刘强东开什么车| 朋友妻不可欺是什么意思| mz是什么意思| 肝硬化是什么原因引起的| 什么是动脉硬化| 归是什么意思| ta代表什么| 皮肤发黑是什么原因引起的| 腰疼挂什么科室| 吃什么健脾| 为什么一进去就软了| 声线是什么意思| 心肌桥是什么意思| 甲状腺欠均匀什么意思| 葫芦炒什么好吃| 2007年属什么| 属鼠的守护神是什么菩萨| 支原体吃什么药| 1977年属什么| 重庆东站什么时候通车| 有代沟是什么意思| 什么蜘蛛有毒| 肾功能不好有什么症状| cnm是什么意思| 客家人什么意思| 一个草字头一个氏念什么| 87年属什么| 万艾可是什么药| 梦见和别人结婚是什么意思| 梦到捡菌子是什么意思| tid什么意思| 双向情感障碍是什么| 取笑是什么意思| 梦见去看病是什么意思| 皮肤为什么会痒| 蓝玫瑰的花语是什么| 口渴是什么病的前兆| 肝气不舒吃什么中成药| 上升水瓶座为什么可怕| 脾大对身体有什么影响| 小孩急性肠胃炎吃什么药| 三个代表代表了什么| 淋巴在什么部位| 讽刺是什么意思| bonnie是什么意思| 凝胶是什么| 捐精有什么要求| 什么叫朋友| 企鹅吃什么食物| 从头再来什么意思| ubc是什么意思| 什么洗面奶好用| 手指头抽筋是什么原因| 尿路感染看什么科| ect是什么| 心猿意马是什么意思| 明胶是什么东西| 碳14是检查什么的| 送女生什么生日礼物比较好| 看输卵管是否堵塞做什么检查| 金牛男最烦什么女孩| 8848是什么意思| 去离子水是什么| 烤瓷牙和全瓷牙有什么区别| 咳嗽有痰吃什么好的快| 宜破屋是什么意思| 十五岁是什么年华| 99年的兔是什么命| 李连杰得了什么病| 兵马俑是什么意思| 特药是什么意思| 潜水什么意思| 为什么会狐臭| 甲肝是什么病| 真丝香云纱是什么面料| 受凉肚子疼吃什么药| 享受低保需要什么条件| 早上吃什么早餐最好| 处方药是什么标志| 小媳妇是什么意思| 脐炎用什么药| 什么锅好| 猕猴桃什么时候成熟| 既寿永昌什么意思| 火烈鸟为什么是红色的| 外阴长什么样| 1975年属兔的是什么命| 女人性冷淡吃什么药| 月老叫什么名字| 盆腔炎吃什么药最有效| 前列腺炎是什么意思| 早上空腹喝淡盐水有什么好处| 什么经验| 什么是民间故事| mr是什么意思| 1120是什么星座| 汤姆福特属于什么档次| 早泄什么症状| 梦到伟人有什么兆头| 布洛芬吃多了有什么副作用| 马赛克是什么意思啊| 一九九八年属什么生肖| 高血压可以吃什么| 啪啪啪什么感觉| 非农业户口是什么意思| 乳腺无回声结节是什么意思| 左室舒张功能减低是什么意思| 螃蟹的什么部位不能吃| 克隆是什么意思| 脚气是什么菌引起的| 肾功能不全吃什么药| 皮肤长斑是什么原因引起的| 梦见别人装修房子是什么预兆| 翡翠和玉的区别是什么| 什么的山坡| 马来玉是什么玉| 诗经又称什么| 艺高胆大是什么生肖| 6月4号是什么星座| 小孩晚上睡觉磨牙是什么原因| 2004年是什么命| 孩子高烧不退是什么原因| 腰椎间盘突出吃什么药| 淋巴细胞百分比低说明什么问题| 西红柿和什么搭配最好| 羊与什么相冲| 荒芜是什么意思| 三个耳读什么| 反复感冒是什么原因引起的| 十一月二十二是什么星座| 灵泛是什么意思| 刷酸是什么意思| 蟹柳是什么做的| 沙砾是什么意思| 心焦是什么意思| 1997年出生属什么| juicy是什么意思| 发呆是什么意思| 为什么男人喜欢女人| 阴道出血是什么样的| 三七甘一是什么意思| 更迭是什么意思| 丝丝入扣是什么意思| 尿道感染流脓吃什么药| 网贷是什么| 体检前三天不能吃什么| 鹅蛋不能和什么一起吃| 尿酸高可以吃什么水果| 减肥吃什么瘦的快| 可好是什么意思| 受惊吓吃什么药| 32岁属什么的生肖| 栓塞是什么意思| 什么是闰年什么是平年| 什么是心律失常| 干湿分离什么意思| 海笋是什么东西| 黑色素痣挂什么科| blanc什么意思| 此情可待什么意思| 尿路感染吃什么药好得快| 电器发生火灾用什么灭火器| 11月17号是什么星座| 辣椒属于什么科植物| 老舍原名是什么| 7月12日是什么星座| 肠系膜淋巴结炎吃什么药最有效| 创伤是什么意思| 甲亢的早期症状是什么| 臭鱼烂虾什么意思| 低度cin病变是什么意思| 尿蛋白阴性是什么意思| 十指纤纤尽夸巧是什么生肖| 糖筛和糖耐有什么区别| 什么是感统失调| 九寨沟在四川什么地方| 肺栓塞有什么症状| 梦见被狼追是什么意思| 怕冷又怕热是什么原因| 女予念什么| 维生素b2是什么| 冶游史是什么意思| 什么牌子的洗衣机最好| 八月一日是什么日子| 为什么睡觉磨牙| 流鼻涕吃什么药好得快| 戊肝是什么病| 1909年属什么生肖| 胸前骨头疼是什么原因| 阴茎越来越小是什么原因| 较重闭合性跌打损伤是什么意思| 范思哲是什么品牌| 甲沟炎有什么药| 手心长痣代表什么| 喝中药为什么会拉肚子| 凝血四项能查出什么病| 护肝养肝吃什么药最好| 阿修罗是什么意思| 芋头不能和什么一起吃| 豆瓣是什么软件| 两个方一个土读什么| 砒霜是什么| 拉肚子吃什么消炎药| 心肾不交吃什么药| 王加民念什么| 长期口臭吃什么药| 流产有什么症状| 次氯酸钠是什么| 做梦踩到屎是什么意思| 用什么点豆腐最健康| 喉咙发炎咳嗽吃什么药好得快| 白细胞少会引起什么病| 煎熬是什么意思| 入党有什么用| 六月十六是什么星座| 综合体是什么意思| 冰粉籽是什么植物| 花痴是什么意思| 眩晕挂号挂什么科| 病态是什么意思| 龙珠是什么| hpv跟tct有什么区别| 脑供血不足吃什么中成药好| ol是什么| 苋菜与什么食物相克| 殿试是什么意思| 百度
This is the Trace Id: 8f1444c67eab801b72bc6defd5fc68bc

Unmasking cyberthreat actors: Join Microsoft Security at Black Hat 2025 in August. Register now.

大人睡觉流口水是什么原因引起的

Microsoft Digital Defense Report 2024: The foundations and new frontiers of cybersecurity

Complex, challenging, and increasingly dangerous

百度 教师节送什么礼物给老师

In the last year, the cyber threat landscape continued to become more dangerous and complex. The malign actors of the world are becoming better resourced and better prepared, with increasingly sophisticated tactics, techniques, and tools that challenge even the world’s best cybersecurity defenders.? Even Microsoft has been the victim of well-orchestrated attacks by determined and well-resourced adversaries, and our customers face more than 600 million cybercriminal and nation-state attacks every day, ranging from ransomware to phishing to identity attacks.

Microsoft’s unique, expansive, and global vantage point gives us unprecedented insight into key trends in cybersecurity affecting everyone from individuals to nations. The spectrum of security signals we see is further enhanced by the diversity of our customers and partners, including governments, enterprises large and small, consumers, and gamers.

Microsoft’s unique vantage point

  • Microsoft serves billions of customers globally, allowing us to aggregate security data from a broad and diverse spectrum of companies, organizations, and consumers.
    ?

    Our presence in the digital ecosystem positions us to observe key trends in cybersecurity. Microsoft’s perspectives on cybersecurity are framed through 50 years of experience and insight.

  • An extra 13 trillion* security signals per day from the cloud, endpoints, software tools, and partner ecosystem, to understand and protect against digital threats and criminal cyberactivity.

    ?

    *2023: 65 trillion, 2024: 78 trillion

  • Microsoft Threat Intelligence now tracks more than 1,500 unique threat groups—including more than 600 nation-state threat actor groups, 300 cybercrime groups, 200 influence operations groups, and hundreds of others.
  • In response to growing cyber threats, Microsoft reassigned roughly 34,000 full-time equivalent engineers to security initiatives. This team is dedicated to enhancing defenses, developing phishing-resistant MFA, and strengthening the corporate network. By prioritizing security, Microsoft ensures its products and services remain resilient against increasingly sophisticated cyberattacks.

  • Microsoft’s support for cloud infrastructure, platforms, applications, and multi-cloud scenarios helps categorize vulnerabilities across critical environments like electrical power monitoring and building automation systems. This vast ecosystem of partners enriches our data, enabling the detection of critical weaknesses. By leveraging this data, we enhance our threat intelligence and continuously strengthen the security of the ecosystem.

Chapter 1 highlights the increasing complexity of the global cyber threat landscape, driven by sophisticated nation-state actors, rising ransomware attacks, evolving fraud tactics, persistent phishing threats, and new challenges in identity security. Insights from this chapter underscore the urgent need for proactive and multi-faceted cybersecurity strategies.

Chapter 1 summary

  • Nation-state threat actors are conducting operations for financial gain and enlisting the aid of cybercriminals and commodity malware to collect intelligence.?

    ?

    In 2024, a key insight was that Education and Research became the second-most targeted sector by nation-state threat actors. These institutions, offering intelligence on research and policy, are often used as testing grounds before pursuing their actual targets.

  • Ransomware remains a critical cybersecurity concern. Microsoft observed a 2.75x year-over-year increase in human-operated ransomware-linked encounters, where at least one device in a network was targeted. Although these encounters have risen, the percentage of organizations that are ultimately ransomed (reaching the encryption stage) has decreased more than threefold over the past two years.

  • Cyber-enabled financial fraud is rising globally, with new trends in payment fraud and the misuse of legitimate services for phishing and malicious activities. One alarming type of fraud is techscam, which tricks users by impersonating legitimate services or using fake tech support and ads. Techscam traffic surged from 2021 to 2023, far outpacing the rise in malware and phishing, underscoring the need for stronger defenses.
  • As organizations move to the cloud, identity-related attacks have surged, with adversaries using compromised credentials to access critical resources.?

    ?

    Microsoft Entra data shows password-based attacks make up over 99% of the 600 million daily identity attacks. Over the past year, Microsoft blocked 7,000 password attacks per second, highlighting the persistent and pervasive nature of these threats.

  • DDoS attacks continued to evolve, targeting the layer. In the second half of the year, Microsoft mitigated 1.25 million DDoS attacks, representing a 4x increase compared with last year.

    ?

    Of note in 2024: The shift toward application-layer attacks poses greater risks to business availability, such as online banking. These attacks are stealthier, more sophisticated, and harder to mitigate than network-level attacks.

For additional details on the evolving cyberthreat landscape, download the full report

Chapter 2 emphasizes everyone’s responsibility for keeping their own houses in order. It advocates for robust accountability beyond just compliance checklists and promotes a threat-informed defense strategy that strengthens resilience across the cyber landscape. This strategy extends beyond organizational security to critical environments and elections, calling for collective action and urging stronger collaboration between industry and government to enhance overall security.

Chapter 2 summary

  • Organizations must address technical debt, outdated security controls, and shadow IT while implementing up-to-date data security policies to stay resilient, especially with the rise of generative AI.
  • Securing operational technology (OT) systems, particularly in critical infrastructure, requires special considerations for improving the security posture of these environments. We see a number of trends that will increasingly impact OT security.
  • Collaboration between industry, governments, and organizations is essential for tackling global cybersecurity threats, from securing defense systems to protecting democratic elections through joint initiatives.

Featured insight: Understanding attack paths for threat-informed defense

One key takeaway from Chapter Two is the need to understand attack paths for threat-informed defense. Organizations should identify the most likely attack paths leading to critical assets and continuously mitigate them. Attack path analysis incorporates asset inventories, vulnerability data, and external attack surfaces to construct a possible attack chain leading to a critical asset.
For additional details on how we can center our organizations on security, download the full report

Chapter 3 explores how AI is transforming both the threat landscape and cybersecurity defense, highlighting emerging AI-driven cyber risks, including nation-state operations. It emphasizes how AI-powered tools enhance defense capabilities and details ongoing global collaboration to establish standards and frameworks for securing AI technology.

Chapter 3 summary

  • The rapidly evolving AI threat landscape introduces both system threats and ecosystem threats. Emerging threat actor techniques include AI-enabled spear phishing, résumé swarming, and deepfakes.
  • AI enhances security operations by improving threat detection, response speed, and incident analysis, providing defenders with significant?advantages against sophisticated attacks and enabling more efficient management of cybersecurity operations.
  • Governments and industries are collaborating on AI security regulations, international standards, and collective defense initiatives to ensure AI's responsible use and to mitigate the risks posed by malicious actors using AI for cyberattacks.

Featured insight: Nation-state threat actors using AI for influence operations

Among the many insights from Chapter Three is the observation that Russia, Iran, China, and other nation states are increasingly incorporating AI-generated or enhanced content into their influence operations in search of greater productivity, efficiency, and audience engagement.

Microsoft is proud to continue its more than 20-year tradition of helping the world understand and mitigate cyber threats with this edition of the Microsoft Digital Defense Report.

We believe transparency and information sharing are essential to the protection of the global cyber ecosystem. Communicating the insights that we derive from our unique vantage point is one of the many ways we work to make the cyber world a safer place.

Executive summaries

Executive Summary

The Executive Summary provides an introduction on the threat landscape by Tom Burt, along with the top insights from the report.

CISO Executive Summary

The CISO edition of the Executive Summary provides an introduction by Igor Tsyganskiy and gives an in-depth, narrative-style summary, highlighting key points of interest for modern chief information security officers.

Governments and Policy Makers Executive Summary

The Government and Policy Makers edition of the Executive Summary, introduced by Tom Burt, highlights key trends in threat actor activity, deterrence, and collective action, offering critical insights for government security leaders and policy makers.

More from Security

Our commitment to earn trust

Microsoft is committed to the responsible use of AI, protecting privacy, and advancing digital safety and cybersecurity.

Emerging threats reports

Learn about the latest emerging threats from Microsoft threat data and research. Get analysis on trends and actionable guidance to strengthen your first line of defense.

Microsoft Digital Defense Report archives

Explore previous Microsoft Digital Defense Reports and see how the threat landscape and online safety has changed in a few short years

Follow Microsoft Security

cta是什么 郑和下西洋是什么时候 虫介念什么 什么叫处方药 wlw是什么意思
胃疼肚子疼是什么原因 巴士是什么意思 健脾吃什么食物 鼓刹和碟刹有什么区别 kap是什么意思
双鱼座上升星座是什么 万岁是什么意思 硬度不够吃什么药调理 韧带拉伤吃什么药 百思不得其解是什么意思
62年的虎是什么命 胆囊炎吃什么药好 寿元是什么意思 东华帝君是什么神仙 什么是树脂材料
眼压低是什么原因hcv7jop6ns2r.cn 梦见剪头发是什么意思hkuteam.com 耳朵上长痘痘什么原因hcv8jop9ns2r.cn 文殊菩萨是管什么的hcv9jop7ns5r.cn 惠州有什么特产bfb118.com
炒什么菜好吃又简单hcv9jop6ns9r.cn 过敏性鼻炎引起眼睛痒用什么药fenrenren.com 全距是什么意思hcv7jop6ns5r.cn 五行白色属什么hcv8jop1ns3r.cn 海星吃什么食物hcv8jop4ns1r.cn
乖巧是什么意思hcv9jop5ns7r.cn 直肠炎是什么原因引起的hcv8jop8ns6r.cn 午马是什么意思imcecn.com 月经先期是什么意思hcv7jop5ns0r.cn 丹参泡水喝有什么功效hcv7jop6ns7r.cn
牙疼吃什么药止痛快hcv8jop4ns6r.cn 规培结束后是什么医生hcv8jop3ns2r.cn 肝内钙化灶什么意思hcv8jop3ns6r.cn 瘥是什么意思wuhaiwuya.com 瓜子脸配什么发型好看hcv9jop2ns9r.cn
百度