Microsoft Digital Defense Report 2024

Join Earl Duby in this latest episode of “Big Reports in Five Minutes” as he summarizes the 2024 Microsoft Digital Defense Report. In this review, he discusses five key points:

  1. Microsoft’s significant security investments.
  2. Evolving tactics of phishing with QR codes.
  3. The role of AI in global cyber warfare.
  4. The volume of data that Microsoft sees on a daily basis.
  5. The effects of politics on cybersecurity.

Whether you’re a cybersecurity professional or just want to stay informed, this breaks down current and emerging threats in the digital landscape.

Link to full report: https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/microsoft-digital-defense-report-2024


Transcript:

0:13) Hey, welcome back. (0:15) It’s been a while since we did a big reports in five minutes, but I’m excited to be back (0:19) here and I have a great report to go over with you today. (0:23) This is the 2024 version of the Microsoft digital defense report.

 

(0:29) So this is, I think their fifth, fifth edition of this report, just a little warning ahead (0:34) of time, if you do want to read this report, it is very dense. (0:37) There is a lot of words in here, not a lot of pictures. (0:42) So if that frightens you, you might want to just listen to this big reports in five minutes (0:46) and call it a day.

 

(0:49) So I’m going to go through five points in five minutes. (0:53) So the first thing I want to talk about is just like this massive investment that Microsoft (0:57) is making into security. (0:59) And you can see in this graphic here, they, they purport to have 34,000 dedicated security(1:08) engineers.

 

(1:09) Like that is just a phenomenal number to me. (1:11) So one company has 34,000 dedicated security engineers because their CEO is recommitting (1:20) Microsoft to security. (1:22) So this sounds like something that Bill Gates did about 20 years ago when he did a big investment(1:26) in security.

 

(1:27) Now they’re trying to get again, and they’ve dedicated a lot of money and a lot of resources (1:32) to this. (1:32) So hopefully that works out for them inside this report. (1:37) There is this pretty cool graphic here that talks about, or it shows the, the number of (1:43) attacks that Iran did against Israel before October of 2023, which was about 10%.

 

(1:52) And then what that looks like after October, 2023, where it went up to about 50% of the(1:58) Iranian attacks were targeted towards Israel. (2:01) So it’s just another picture of how politics and cybersecurity, cyber attacks are all fusing (2:08) together. (2:10) And, you know, it really makes the question about what exactly is cyber war kind of come (2:14) to the forefront when you see pictures like this, when you can see that political motives (2:19) are being accentuated with cyber attacks.

 

(2:23) The next point I want to talk about real quick is just the, the phishing emails and the analysis (2:28) that Microsoft has done looking at their platform and looking at partner reports and all the (2:35) data that they’re getting. (2:36) But the interesting thing is, you know, we all understand that phishing emails typically (2:42) include a link or an attachment, it’s either a malicious link to a website that’s trying (2:47) to collect your credentials, or there’s an attachment of like a poisoned PDF file or (2:54) a malicious exe file or something. (2:57) This picture here shows that the new trend is now to put QR codes into phishing emails.

 

(3:04) And this, this is causing problems in a couple different ways. (3:09) You know, one is typically we inform users to like hover over links to see where it’s (3:14) really going. (3:14) That doesn’t work with QR codes.

 

(3:17) So QR codes are really obscure in the fact that there’s really not a good way that we (3:22) can teach people to figure out if it’s a good code or not. (3:27) So this, this attack vector rising to 25% of all phishing emails is a little concerning (3:34) and just something to keep your eye on. (3:36) And a lot of the phishing tools, I’m sure they’ll catch up, but you know, this is getting(3:40) through because it can’t really detonate these things in the way that it does with (3:46) attachments and links.

 

(3:48) So just be aware of the fact that QR codes are rising in prevalence in phishing emails.(3:54) This next graphic is an interesting discussion around artificial intelligence because (4:01) obviously no security report is complete without a discussion about artificial intelligence. (4:05) So this just shows how our main adversaries, China, Russia, and Iran are using AI driven (4:12) content to drive discourse and dissent here in the U.S., whether it’s by, you know, talking (4:20) about, you know, imprisoning students or having deep faked Elon Musk audio on top of some(4:31) discerning or kind of concerning content or just, you know, Iran kind of, you can see (4:37) over there in the last part, Iran tries to do, you know, artificial intelligence, but (4:43) they clearly are not to the level that China and Russia are yet, but they’re still trying.

 

(4:47) So just be aware of the fact that there is still a lot of artificial intelligence that (4:52) we got to get our arms wrapped around from a security perspective. (4:56) And then the final point, you know, I talked about the 34,000 security engineers, but this (5:04) was just an astounding number to me. (5:07) So Microsoft claims that they process 78 trillion security signals per day.

 

(5:14) And a security signal comes from endpoints, cloud, you know, email, whatever. (5:20) It’s a, it’s a point, a data point that’s coming from these various sources, 78 trillion (5:27) of these per day, which is up 13 trillion from last year. (5:32) These are just totally amazing numbers to me.

 

(5:35) So anyways, it’s a dense report. (5:38) It’s got some good information in it, lots of words.(5:41) So you can either take my word for it and take those five points and, you know, do (5:46) something with them or you can read the report yourself.

 

(5:48) But in either event, just realize that the digital world is changing out there. (5:54) It’s challenging. (5:56) So be safe and we’ll talk to you next time.