Microsoft, CrowdStrike Collaborate to Enhance Threat Intelligence Sharing

Market IntelTuesday, Jun 3, 2025 12:04 am ET
1min read

Microsoft and CrowdStrike have announced a strategic collaboration aimed at enhancing the coordination of threat intelligence across different security vendors. This partnership focuses on mapping the aliases of network threat actors and aligning attacker attributions across platforms, thereby reducing confusion caused by disparate naming systems. By doing so, the collaboration aims to accelerate the response of network defenders against complex attackers.

The two companies have developed a shared network threat intelligence mapping system. This system connects attacker identifiers across various vendor ecosystems without enforcing a single naming standard. This approach reduces the fragmentation of attacker labels, making it easier for defenders to make swift and confident decisions. The system has already successfully "deduplicated" over 80 attackers, ensuring that the threat research teams of both companies are aligned in their naming conventions.

Adam Meyers, the Vice President of Intelligence at CrowdStrike, highlighted the importance of this collaboration. He stated, "Attackers hide behind the chaos created by technological and inconsistent naming. As defenders, our job is to stay ahead and provide security teams with clear insights into who is attacking them and how to respond." This initiative underscores the commitment of both companies to improving the overall effectiveness of threat intelligence sharing and fostering a more cohesive cybersecurity landscape.

The collaboration between Microsoft and CrowdStrike is part of a broader effort to coordinate the identification and tracking of network threat actors across various security vendors. By sharing information and aligning their threat research teams, the two companies aim to enhance the overall effectiveness of cybersecurity measures. This partnership is a significant step towards creating a more unified and efficient approach to combating cyber threats, benefiting both organizations and their customers.