Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion

Posted on June 3, 2025June 3, 2025 By CWS

Jun 03, 2025Ravie LakshmananThreat Intelligence / Cyber Threats
Microsoft and CrowdStrike have introduced that they’re teaming as much as align their particular person menace actor taxonomies by publishing a brand new joint menace actor mapping.
“By mapping the place our information of those actors align, we are going to present safety professionals with the flexibility to attach insights sooner and make selections with higher confidence,” Vasu Jakkal, company vice chairman at Microsoft Safety, stated.
The initiative is seen as a strategy to untangle the menagerie of nicknames that personal cybersecurity distributors assign to varied hacking teams which can be broadly categorized as a nation-state, financially motivated, affect operations, personal sector offensive actors, and rising clusters.

For instance, the Russian state-sponsored menace actor tracked by Microsoft as Midnight Blizzard (previously Nobelium) is also referred to as APT29, BlueBravo, Cloaked Ursa, Cozy Bear, Iron Hemlock, and The Dukes.
Likewise, Forest Blizzard (beforehand Strontium) goes by different monikers reminiscent of Blue Athena, BlueDelta, Fancy Bear, Combating Ursa, FROZENLAKE, Iron Twilight, Pawn Storm, Sednit, Sofacy, and TA422. Microsoft shifted from utilizing chemical elements-inspired names to a weather-themed menace actor nomenclature in April 2023.
In aligning these names throughout distributors, the concept is to make monitoring overlapping menace actor exercise so much simpler and keep away from undesirable confusion in the case of menace actor attribution that in flip, can scale back confidence, complicate evaluation, and delay response.
Whereas the unified menace mapping system is a two-party effort, Google and its Mandiant subsidiary in addition to Palo Alto Networks Unit 42 are additionally anticipated to contribute to the trouble. Different cybersecurity firms are prone to be a part of the initiative sooner or later. That stated, the collaboration doesn’t goal to create a single naming customary.

CrowdStrike stated the alignment has led to efficiently deconflicting greater than 80 adversaries, including the alliance goals to raised correlate menace actor aliases with out sticking to a single naming scheme. It referred to as the brand new glossary a “Rosetta Stone.”
“As well as, the place telemetry enhances each other, there’s a possibility to increase attribution throughout extra planes and vectors — constructing a richer, extra correct view of adversary campaigns that advantages your entire group,” CrowdStrike’s Adam Meyers stated.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Actor, Attribution, Confusion, CrowdStrike, Cut, Glossary, Launch, Microsoft, Shared, Threat

Post navigation

Previous Post: Hackers Exploit AI Tools Misconfiguration To Run Malicious AI-generated Payloads
Next Post: Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely

Related Posts

Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization The Hacker News
Why Offensive Security Training Benefits Your Entire Security Team The Hacker News
Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU The Hacker News
CISO’s Guide To Web Privacy Validation And Why It’s Important The Hacker News
OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities The Hacker News
Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News