Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion

Posted on June 3, 2025June 3, 2025 By CWS

Jun 03, 2025Ravie LakshmananThreat Intelligence / Cyber Threats
Microsoft and CrowdStrike have introduced that they’re teaming as much as align their particular person menace actor taxonomies by publishing a brand new joint menace actor mapping.
“By mapping the place our information of those actors align, we are going to present safety professionals with the flexibility to attach insights sooner and make selections with higher confidence,” Vasu Jakkal, company vice chairman at Microsoft Safety, stated.
The initiative is seen as a strategy to untangle the menagerie of nicknames that personal cybersecurity distributors assign to varied hacking teams which can be broadly categorized as a nation-state, financially motivated, affect operations, personal sector offensive actors, and rising clusters.

For instance, the Russian state-sponsored menace actor tracked by Microsoft as Midnight Blizzard (previously Nobelium) is also referred to as APT29, BlueBravo, Cloaked Ursa, Cozy Bear, Iron Hemlock, and The Dukes.
Likewise, Forest Blizzard (beforehand Strontium) goes by different monikers reminiscent of Blue Athena, BlueDelta, Fancy Bear, Combating Ursa, FROZENLAKE, Iron Twilight, Pawn Storm, Sednit, Sofacy, and TA422. Microsoft shifted from utilizing chemical elements-inspired names to a weather-themed menace actor nomenclature in April 2023.
In aligning these names throughout distributors, the concept is to make monitoring overlapping menace actor exercise so much simpler and keep away from undesirable confusion in the case of menace actor attribution that in flip, can scale back confidence, complicate evaluation, and delay response.
Whereas the unified menace mapping system is a two-party effort, Google and its Mandiant subsidiary in addition to Palo Alto Networks Unit 42 are additionally anticipated to contribute to the trouble. Different cybersecurity firms are prone to be a part of the initiative sooner or later. That stated, the collaboration doesn’t goal to create a single naming customary.

CrowdStrike stated the alignment has led to efficiently deconflicting greater than 80 adversaries, including the alliance goals to raised correlate menace actor aliases with out sticking to a single naming scheme. It referred to as the brand new glossary a “Rosetta Stone.”
“As well as, the place telemetry enhances each other, there’s a possibility to increase attribution throughout extra planes and vectors — constructing a richer, extra correct view of adversary campaigns that advantages your entire group,” CrowdStrike’s Adam Meyers stated.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Actor, Attribution, Confusion, CrowdStrike, Cut, Glossary, Launch, Microsoft, Shared, Threat

Post navigation

Previous Post: Hackers Exploit AI Tools Misconfiguration To Run Malicious AI-generated Payloads
Next Post: Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely

Related Posts

Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It The Hacker News
Secure Vibe Coding: The Complete New Guide The Hacker News
Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment The Hacker News
Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack The Hacker News
CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks The Hacker News
5 Lessons from River Island The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News