www.microsoft.com
Open in
urlscan Pro
2600:1408:ec00:1086::356e
Public Scan
Submitted URL: http://go.microsoft.com/fwlink/?linkid=37020&name=PUADlManager:Win32/OfferCore&threatid=311999&enterprise=1
Effective URL: https://www.microsoft.com/en-us/wdsi/threats
Submission: On December 13 via api from US — Scanned from US
Effective URL: https://www.microsoft.com/en-us/wdsi/threats
Submission: On December 13 via api from US — Scanned from US
Form analysis
1 forms found in the DOMName: searchForm — GET https://www.microsoft.com/en-us/search/explore
<form class="c-search" autocomplete="off" id="searchForm" name="searchForm" role="search" action="https://www.microsoft.com/en-us/search/explore" method="GET"
data-seautosuggest="{"queryParams":{"market":"en-us","clientId":"7F27B536-CF6B-4C65-8638-A0F8CBDFCA65","sources":"Iris-Products,DCatAll-Products,Microsoft-Terms","filter":"+ClientType:StoreWeb","counts":"1,5,5"},"familyNames":{"Apps":"App","Books":"Book","Bundles":"Bundle","Devices":"Device","Fees":"Fee","Games":"Game","MusicAlbums":"Album","MusicTracks":"Song","MusicVideos":"Video","MusicArtists":"Artist","OperatingSystem":"Operating System","Software":"Software","Movies":"Movie","TV":"TV","CSV":"Gift Card","VideoActor":"Actor"}}"
data-seautosuggestapi="https://www.microsoft.com/msstoreapiprod/api/autosuggest"
data-m="{"cN":"GlobalNav_Search_cont","cT":"Container","id":"c3c1c9c4c1m1r1a1","sN":3,"aN":"c1c9c4c1m1r1a1"}" aria-expanded="false"
style="overflow-x: visible;">
<div class="x-screen-reader" aria-live="assertive"></div>
<input id="cli_shellHeaderSearchInput" aria-label="Search Expanded" aria-expanded="false" aria-controls="universal-header-search-auto-suggest-transparent" aria-owns="universal-header-search-auto-suggest-ul" type="search" name="q"
placeholder="Search Microsoft.com" data-m="{"cN":"SearchBox_nav","id":"n1c3c1c9c4c1m1r1a1","sN":1,"aN":"c3c1c9c4c1m1r1a1"}" data-toggle="tooltip" data-placement="right"
title="Search Microsoft.com" role="combobox" aria-autocomplete="list" style="overflow-x: visible;">
<button id="search" aria-label="Search Microsoft.com" class="c-glyph" data-m="{"cN":"Search_nav","id":"n2c3c1c9c4c1m1r1a1","sN":2,"aN":"c3c1c9c4c1m1r1a1"}" data-bi-mto="true"
aria-expanded="false" style="overflow-x: visible;">
<span role="presentation" style="overflow-x: visible;">Search</span>
<span role="tooltip" class="c-uhf-tooltip c-uhf-search-tooltip" style="overflow-x: visible;">Search Microsoft.com</span>
</button>
<div class="m-auto-suggest" id="universal-header-search-auto-suggest-transparent" role="group" style="overflow-x: visible;">
<ul class="c-menu" id="universal-header-search-auto-suggest-ul" aria-label="Search Suggestions" aria-hidden="true" data-bi-dnt="true" data-bi-mto="true" data-js-auto-suggest-position="default" role="listbox" data-tel="jsll"
data-m="{"cN":"search suggestions_cont","cT":"Container","id":"c3c3c1c9c4c1m1r1a1","sN":3,"aN":"c3c1c9c4c1m1r1a1"}" style="overflow-x: visible;"></ul>
<ul class="c-menu f-auto-suggest-no-results" aria-hidden="true" data-js-auto-suggest-postion="default" data-js-auto-suggest-position="default" role="listbox" style="overflow-x: visible;">
<li class="c-menu-item" style="overflow-x: visible;"> <span tabindex="-1" style="overflow-x: visible;">No results</span></li>
</ul>
</div>
</form>
Text Content
This is the Trace Id: dd03bc870faac9e33a3f872ac7809088 Skip to main content Microsoft Microsoft Security Intelligence Microsoft Security Intelligence Microsoft Security Intelligence * Home * Threats * Blogs * Downloads * Updates Updates * Antimalware updates * Definition change log * Security software Security software * Windows security * Microsoft Defender ATP * Microsoft Threat Protection * Cleanup tools Cleanup tools * Malicious Software Removal Tool (MSRT) * Safety Scanner * Microsoft Defender Offline * Submissions * Submit a file * View submission history * Report unsafe site * Attack surface reduction * Help * Safety tips Safety tips * Sources of infection * Avoid tech support scams * Troubleshoot detection and removal * Up-to-date software * Developer resources * Our methodologies Our methodologies * Threat naming * Threat identification criteria * Security industry alliances * More * All Microsoft * GLOBAL * Microsoft Security * Azure * Dynamics 365 * Microsoft 365 * Microsoft Teams * Windows 365 * Tech & innovation Tech & innovation * Microsoft Cloud * AI * Azure Space * Mixed reality * Microsoft HoloLens * Microsoft Viva * Quantum computing * Sustainability * Industries Industries * Education * Automotive * Financial services * Government * Healthcare * Manufacturing * Retail * All industries * Partners Partners * Find a partner * Become a partner * Partner Network * Azure Marketplace * AppSource * Resources Resources * Blog * Microsoft Advertising * Developer Center * Documentation * Events * Licensing * Microsoft Learn * Microsoft Research * View Sitemap Search Search Microsoft.com * No results Cancel 0 Cart 0 items in shopping cart Sign in to your account Sign in Search encyclopedia THREAT TRENDS RANSOMWARE Discover what makes ransomware one of the most prevalent threats Ransomware-as-a-service (RaaS) Incident response playbook for ransomware Microsoft defense against ransomware IDENTITY-BASED ATTACKS Learn about the different techniques threat actors are using to attack identities and gain access to resources Adversary-in-the-middle (AiTM) Token theft Password spray attacks BUSINESS EMAIL COMPROMISE (BEC) Identify BEC attacks and learn how to protect organizations from this threat Understand how BEC works Detect and mitigate a BEC campaign Disrupt BEC attacks THREAT ACTOR UPDATES NATION-STATE THREAT ACTORS Nation-state threat actors launch cyber operations that are often focused on collecting data on their targets Blizzard threat actors Sandstorm threat actors Typhoon threat actors FINANCIALLY MOTIVATED THREAT ACTORS Cybercriminals continue to enhance their tools and techniques to maximize the impact of their campaigns, including ransomware and identity theft Octo Tempest Storm-0501 Other financially motivated actors NATION-STATE INFLUENCE OPERATIONS Nation-states launch influence operations to sway public perception and sentiment, sow discord, and undermine trust in public institutions Russian influence operations Iranian influence operations Chinese influence operations THREAT ACTOR SPOTLIGHT: SLEET ACTORS Learn about the latest activity associated with North Korean threat actors Sleet threat actors MICROSOFT THREAT ACTOR NAMING TAXONOMY Learn about how Microsoft names threat actors Complete list of threat actor categories THREAT ACTORS USING AI Learn about emerging threats in the age of AI, focusing on identified activity associated with known threat actors How threat actors are using AI in their campaigns FOLLOW US * * * What's new * Surface Pro * Surface Laptop * Surface Laptop Studio 2 * Surface Laptop Go 3 * Microsoft Copilot * AI in Windows * Explore Microsoft products * Windows 11 apps Microsoft Store * Account profile * Download Center * Microsoft Store support * Returns * Order tracking * Certified Refurbished * Microsoft Store Promise * Flexible Payments Education * Microsoft in education * Devices for education * Microsoft Teams for Education * Microsoft 365 Education * How to buy for your school * Educator training and development * Deals for students and parents * Azure for students Business * Microsoft Cloud * Microsoft Security * Dynamics 365 * Microsoft 365 * Microsoft Power Platform * Microsoft Teams * Microsoft 365 Copilot * Small Business Developer & IT * Azure * Developer Center * Documentation * Microsoft Learn * Microsoft Tech Community * Azure Marketplace * AppSource * Visual Studio Company * Careers * About Microsoft * Company news * Privacy at Microsoft * Investors * Diversity and inclusion * Accessibility * Sustainability English (United States) Your Privacy Choices Opt-Out Icon Your Privacy Choices Your Privacy Choices Opt-Out Icon Your Privacy Choices Consumer Health Privacy * Sitemap * Contact Microsoft * Privacy * Manage cookies * Terms of use * Trademarks * Safety & eco * Recycling * About our ads * © Microsoft 2024