Microsoft plans a naming system for hackers • Blisstech Solutions

Ever tried following a TV show where the villain has four different names?

Pretty confusing, right?

That’s exactly what’s happening in cybersecurity today.

The same hacking group might be called completely different things depending on who’s reporting—Microsoft, Google, CrowdStrike, or another security firm. And that’s a problem. It creates confusion and slows down how quickly experts—and the businesses they protect—can respond to cyber threats.

To tackle this, Microsoft and CrowdStrike are joining forces.

They’re introducing a unified naming system for hacking groups. Think of it as giving each cybercriminal gang one consistent label that everyone uses. It’s not just about tidying up names—it’s about speeding up threat detection, understanding attacker behaviour, and improving response times.

Take this example: a group targeting businesses like yours might be called Salt Typhoon by Microsoft, GhostEmperor by another firm, and OPERATOR PANDA by someone else. If you don’t realise they’re all the same threat, you could miss vital clues. And in cybersecurity, every second counts.

Microsoft’s new system will categorise hacking groups by type and origin using weather-themed names:

  • Typhoon for Chinese state-backed groups
  • Blizzard for Russian ones
  • Tempest, Storm, or Tsunami for ransomware gangs and spyware developers

It’s a simple idea—but a powerful one.

And it matters more than you might think.

Clearer naming means your IT team or cybersecurity provider can spot patterns faster, act sooner, and strengthen your defences. It leads to better threat intelligence, fewer missed warnings, and quicker responses when something suspicious pops up.

Ultimately, collaboration between major players like Microsoft, CrowdStrike, and Google helps level the playing field for smaller businesses. You don’t need to be a cybersecurity expert to benefit—just knowing that everyone’s speaking the same language when a threat hits can make all the difference.

This behind-the-scenes change might not make headlines, but it could have a big impact on keeping your business safe. It’s another step towards making cybersecurity less chaotic—and far more effective.

Want help protecting your business from cyber attacks? Let’s talk.

More Content

Templates and Slide Masters in PowerPoint title

Tech Tip: How to use Templates and Slide Masters in PowerPoint

This Tech Tip will show you how to use templates and Slide Masters in PowerPoint to give your presentations a professional and consistent look. I've been using PowerPoint for over 25 years and have created a lot of presentations. Previously, I would work from a...

Some bosses think their people do less when working from home

Microsoft has become the leader of productivity over many decades. Can you imagine doing your day to day work without their software? So it’s no surprise the tech giant recently conducted a major new survey into productivity in the workplace – and some of the results might surprise you. Researchers surveyed 20,000 people working for […]

Are you using Teams to share sensitive data?

Microsoft Teams has fast become one of THE most useful business tools for the way we work today. No matter where your people work from, they can communicate and collaborate quickly and reliably. But this remote way of working can also open the door to some MAJOR security issues. New research shows that nearly HALF of employees frequently share confidential …

Is this the most dangerous phishing scam yet?

Is SubdoMailing the most dangerous phishing scam yet?

Bad news: Cyber criminals have yet another new phishing scam up their sleeves and it could be the most dangerous one yet. They’re using genuine subdomains that have been abandoned. We tell you how to stay safe.

A woman looking at her phone while working from home

Office 365 and Windows RDS: Maximum Remote Working Flexibility

Windows Remote Desktop Services (RDS) has been around for years. I was using it over 20 years ago and was a fan.  It was an excellent solution for flexible working over slow connections, which is all we had back then!  However, back then, you needed something else to...
Don’t sleep on this simple, effective security booster

Don’t sleep on this simple, effective security booster

Microsoft’s enforcing an extra layer of security for logins to one of its tools. Even if you don’t use it, you should follow their lead and implement this security booster in your business.

More businesses are proactively investing in cyber security defences

More businesses are investing in cyber security defences

Cyber security: More and more businesses are making the smart business decision to invest in it. Find out why you should join them.

A woman on a laptop with a shield and lock on the screen

Why you should use a password manager

Introduction It can be difficult to keep track of all of your online passwords, especially if you have multiple accounts for different purposes.  But did you know that there is a way to keep all of your passwords safe and secure? A password manager such as LastPass...

Tech Tip: How to find the tools you need in Microsoft Office

Welcome to a new Tuesday tech tip video, and it's another speedy, but useful one Are you struggling to find the tools you need in Office applications? Me too! Since Microsoft introduced the ribbon in Office applications, it has become harder to find tools that you...
How to use crossreferences in Word

Tech Tip: How to use cross references in Word

Today's Two Minute Tech Tip is another tip for Microsoft Word. If you use Word to write documentation, contracts or any other type of detailed document, then this tip is for you. Usually, when you write such a document, you need to refer to other places in the...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05