The FBI and Microsoft are working together to identify the most common types of malware that infect Windows 10 computers, according to an internal report obtained by Axios.

The malware threat that the FBI is focusing on is known as “anomaly-tracking malware” that allows a hacker to collect information about an individual’s internet activity and upload it to a server.

The FBI is also trying to develop a method of tracking these anomalies in the cloud.

The report, titled “Anomaly Tracking Malware: Threat and Countermeasures”, was shared with federal agencies by an unidentified former FBI official who worked on cyber crimes against the United States.

The former official has not been identified and did not respond to requests for comment.

The FBI is working to develop an algorithm that can be used to identify anomalies in computer activity.

“The ability to gather and analyze anomalies in an environment like this is a huge step forward for us in the cybersecurity arena,” FBI Director James Comey told Congress in March.

The agency’s research efforts have focused on identifying the most popular and significant threats to the security of the computers in its computers, the report said.

According to the report, malware is targeted to steal the identity of users by compromising their machines’ hard drives or routers.

It is also targeted to infect infected computers with malware that allows the attacker to spy on their computer.

It’s a technique known as a “shadow login” that is not easily spotted by the user, but can compromise the system and its data.

Malware is also aimed at infecting the computers with a malicious backdoor or “keylogger”, which allows the attackers to gain unauthorized access to the computer.

This can then be used for unauthorized purposes.

This type of malware is also known as an “exploit kit” or a “rootkit”.

According to an April 2016 report from the U.S. Government Accountability Office, the FBI identified nearly 400 “malware variants” that can infect more than 10 million computers.

“We believe that the threat landscape is very different from the past,” said a former FBI agent who spoke on condition of anonymity to discuss the report.

“Malware today is much more sophisticated and it is much harder to detect.”

The agency has also worked to develop ways to thwart the use of exploit kits, the former official said.

In the past, the bureau used techniques like reverse engineering to help find and stop exploit kits.

“It is now becoming easier for the FBI to identify these tools and prevent their use,” the former agent said.