Microsoft Et Al Pledge 'Clarity' on Cybercrew Names
- On Monday, Microsoft and CrowdStrike announced a partnership to link the various names they use for the same cyber adversaries in their respective threat identification efforts.
- The initiative responds to long-standing issues where inconsistent naming conventions among cybersecurity firms create confusion and delay threat intelligence sharing.
- This effort involves mapping over 80 identified threat groups with their aliases from multiple vendors, including contributions from Google’s Mandiant and Palo Alto Networks’ Unit 42.
- Adam Meyers emphasized that creating a unified framework for matching different threat actor names enables security teams to respond more rapidly, while Michael Sikorski described this increased coordination among threat intelligence groups as an important advancement toward more efficient and effective defense efforts.
- Although companies retain their own naming schemas, the collaboration creates a common baseline that reduces confusion, enabling faster, clearer defense against sophisticated cyber adversaries.
29 Articles
29 Articles
The technological giants Microsoft and Google have created a public glossary to order the universe of cybercrime and decipher the alias of criminals.
CrowdStrike, Microsoft aim to eliminate confusion in threat group attribution
CrowdStrike and Microsoft announced an agreement Monday to formally connect the different names each company uses for the same threat groups in their attribution analysis. The companies said the effort will clarify inconsistencies across the industry’s naming taxonomies and acknowledge when both companies identify the same threat groups. The alliance between the longstanding competitors doesn’t call for a universal naming standard or change the…
CrowdStrike and Microsoft, two companies in the cybersecurity industry, have joined forces to solve a central problem in the fight against digital threats: the inconsistent designation of attackers. The aim of their cooperation is to create more clarity and efficiency in cyber defence through a cross-platform assignment of threat actors. Disparate names, delayed response In the cybersecurity world, many names are circulating for the same actors …
Coverage Details
Bias Distribution
- 100% of the sources are Center
To view factuality data please Upgrade to Premium
Ownership
To view ownership data please Upgrade to Vantage