Your trends
- TrendThemeImpact AreasCategorySummaryReport
-
Short Trend Summary
The lines between nation-state attacks and cybercriminal activity are blurring, with both groups adopting each other's tactics and tools.
Nation-State & Cybercrime Blur- Navigating Global Uncertainty
- Critical infrastructure
- Financial institutions
- Government agencies
- Cybersecurity
- Government & Politics
The lines between nation-state attacks and cybercriminal activity are blurring, with both groups adopting each other's tactics and tools.
Microsoft: Digital Defense Report 2024Nation-State & Cybercrime Blur
The lines between nation-state attacks and cybercriminal activity are blurring, with both groups adopting each other's tactics and tools. -
Short Trend Summary
Hybrid warfare tactics are evolving, with increased reliance on cyber and influence operations to achieve geopolitical objectives.
Hybrid Warfare Expansion- AI-Driven Transformation
- Navigating Global Uncertainty
- The Blurring of Physical and Digital Realities
- Critical infrastructure
- Geopolitical stability
- Public trust
- Cybersecurity
- Government & Politics
- Media & Information
Hybrid warfare tactics are evolving, with increased reliance on cyber and influence operations to achieve geopolitical objectives.
Microsoft: Digital Defense Report 2024Hybrid Warfare Expansion
Hybrid warfare tactics are evolving, with increased reliance on cyber and influence operations to achieve geopolitical objectives. -
Short Trend Summary
Ransomware attacks are becoming more sophisticated, targeting both on-premises and cloud assets, and involving increased tampering with security products.
Ransomware Evolution- AI-Driven Transformation
- Navigating Global Uncertainty
- All sectors
- Critical infrastructure
- Business & Commerce
- Cybersecurity
Ransomware attacks are becoming more sophisticated, targeting both on-premises and cloud assets, and involving increased tampering with security products.
Microsoft: Digital Defense Report 2024Ransomware Evolution
Ransomware attacks are becoming more sophisticated, targeting both on-premises and cloud assets, and involving increased tampering with security products.