Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Microsoft Switches to Weather-themed APT

April 21, 2023
Reading Time: 2 mins read
in News

Microsoft has announced that it will use weather-themed naming for advanced persistent threats (APTs) and other threat actors to better contextualize public APT disclosures. The new naming scheme is intended to provide better context to customers and security researchers facing an overwhelming amount of threat intelligence data.

The new taxonomy will categorize actors into nation-state, financially motivated, private sector cyber-mercenaries, influence operations, and groups in development, with specific countries linked to malware operations. This new approach will enable security professionals to quickly understand the type of threat actor they are facing.

Previously, Microsoft used an all-caps naming scheme based on chemical elements like ACTINIUM and IRIDIUM to describe nation-state and other advanced malware tracking activities. However, the company now claims that the complexity, scale, and volume of threats demand a new naming taxonomy.

The new naming scheme will provide a more organized, memorable, and easy way to reference adversary groups so that organizations can prioritize threats and protect themselves more effectively.

Financially motivated actors will be called Tempest while PSOA (private sector offensive actors) will be described as Tsunami. Microsoft will name actors linked to influence operations as Flood and groups in development as Storm. The company aims to make it easier to identify and remember its threat actors with this new approach.

To help manage the transition, Microsoft has published guidance that maps the older chemical element naming scheme to the new taxonomy.

Reference:
  • Microsoft shifts to a new threat actor naming taxonomy

Tags: ActiniumApril 2023APTsCyber NewsCyber News 2023IRIDIUMMalwareMicrosoft
ADVERTISEMENT

Related Posts

US Treasury Sanctions Russian Tech Firm Aeza

US Treasury Sanctions Russian Tech Firm Aeza

July 2, 2025
US Treasury Sanctions Russian Tech Firm Aeza

Trump’s Cyber Director Nominee Advances

July 2, 2025
US Treasury Sanctions Russian Tech Firm Aeza

LevelBlue to Acquire Trustwave for MSSP Lead

July 2, 2025
U.S. Busts North Korean IT Worker Scheme

U.S. Busts North Korean IT Worker Scheme

July 1, 2025
U.S. Busts North Korean IT Worker Scheme

Europol Cracks $540 Million Crypto Fraud

July 1, 2025
U.S. Busts North Korean IT Worker Scheme

SASE Leader Cato Networks Gets $359M Funding

July 1, 2025

Latest Alerts

Oil-Themed Phishing Spreads Snake Keylogger

Forminator Plugin Flaw Risks 600,000 Sites

Kimsuky Tricks Users Into Self Hacking

Scammers Use Fake Ads to Steal Pi Wallets

Blind Eagle Uses VBS Scripts to Deploy RATs

C4 Bomb Cracks Chrome Cookie Encryption

Subscribe to our newsletter

    Latest Incidents

    Cyberattack on Brazils CM Software Vendor

    Cyberattack Halts Hero España Production

    Hacker Attack on Australian Airline Qantas

    Cyberattack Hits Austrian Hospital Vendor

    Sophisticated Attack Hits War Crimes Court

    Ransomware Hits Swiss Government Vendor

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial