
Highlights
What’s in a name? Well, a lot, if you’re talking cyber crime. Different groups go by different names, and it’s making attacks harder to respond to. A fix is on the way…
Ever tried following a TV show where the villain has four different names?
Confusing, right?
That’s exactly what’s happening in the world of cyber security.
One hacking group might be tracked under completely different names depending on who’s reporting—whether it’s Microsoft, Google, CrowdStrike, or another security firm.
It’s messy. And worse, it slows down how quickly experts—and the businesses they protect—can respond to attacks.
That’s why Microsoft and CrowdStrike are teaming up to fix it.
They’re developing a unified naming system for hacking groups. Think of it as giving each cyber criminal gang one agreed-upon label. It’s not just about tidying up the names—it’s about making it faster and easier to understand who’s attacking, how they operate, and how to stop them.
Why this matters
Let’s say a hacking group is targeting businesses like yours. Microsoft might call them Salt Typhoon. Another firm might refer to the same group as GhostEmperor or OPERATOR PANDA.
Unless you know they’re all the same threat, it’s easy to miss the full picture. And in a cyber attack, every second counts.
The new naming system will categorise groups by type and origin using weather-themed terms:
Chinese state-backed groups → “Typhoon”
Russian groups → “Blizzard”
Ransomware gangs, spyware developers → “Tempest”, “Storm”, or “Tsunami”
Simple. But powerful.
What it means for your business
Clearer threat identification means your IT team or cyber security provider can:
- Spot patterns faster
- Respond more effectively
- Avoid missing critical warnings
It’s better threat intelligence. And a stronger, faster defence.
This kind of collaboration between big players like Microsoft, CrowdStrike, and Google helps level the playing field for smaller businesses. You don’t need to be a cyber security expert to benefit—just knowing everyone’s speaking the same language when a threat hits can make all the difference.
It’s one of those behind-the-scenes changes that won’t grab headlines—but could make a big impact on keeping your business safe.
Want help making sure your business is protected against cyber threats? Let’s talk.
Tell us about yourself so we can serve you best.
More articles

Heading 1
Heading 2
Heading 3
Heading 4
Heading 5
Heading 6
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.
Block quote
Ordered list
- Item 1
- Item 2
- Item 3
Unordered list
- Item A
- Item B
- Item C
Bold text
Emphasis
Superscript
Subscript

Heading 1
Heading 2
Heading 3
Heading 4
Heading 5
Heading 6
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.
Block quote
Ordered list
- Item 1
- Item 2
- Item 3
Unordered list
- Item A
- Item B
- Item C
Bold text
Emphasis
Superscript
Subscript
.avif)

.avif)

