Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Defender for Office 365 to Block Email Bombing Attacks

Posted on June 18, 2025June 18, 2025 By CWS

Microsoft has introduced a brand new safety functionality inside its Defender for Workplace 365 suite aimed toward combating the rising risk of e-mail bombing assaults. 

The function, formally labeled “Mail Bombing Detection,” will routinely determine and quarantine high-volume e-mail flooding campaigns that try and overwhelm person inboxes or obscure respectable messages. 

This know-how enhancement will likely be deployed globally between late June and July 2025, offering organizations with improved safety towards this more and more frequent assault vector with out requiring further configuration from safety groups.

E-mail Bombing Threats and Detection Mechanisms

E-mail bombing represents a complicated type of cybersecurity risk the place attackers flood goal mailboxes with terribly excessive volumes of messages in brief timeframes. 

These assaults serve twin malicious functions: overwhelming e-mail infrastructure and burying necessary respectable communications beneath waves of junk content material. 

Microsoft’s new detection know-how employs superior machine studying algorithms to determine patterns in step with bombing campaigns, distinguishing them from regular high-volume respectable e-mail visitors akin to newsletters or advertising and marketing communications.

The system works by analyzing message velocity, sender status metrics, and content material similarity elements throughout the Microsoft 365 defender platform. 

When suspicious patterns emerge, the MailBombingDetection module triggers defensive protocols that routinely route recognized messages to customers’ Junk folders. 

Microsoft engineers have developed this technique to respect current Secure Sender configurations, making certain that licensed high-volume senders stay unaffected by the brand new safety layer.

Safety Operations groups will achieve visibility into e-mail bombing assaults by way of a number of interfaces inside the Microsoft Defender portal. 

The brand new detection sort will likely be prominently displayed in Menace Explorer (ThreatExplorer.Motion == “MailBombing”), E-mail Entity View, and the E-mail Abstract Panel. For organizations utilizing programmatic safety monitoring, the detections may also be accessible by way of Superior Looking queries utilizing KQL (Kusto Question Language).

This integration ensures seamless incorporation into current safety workflows and reporting mechanisms, permitting organizations to keep up complete visibility throughout their risk panorama.

The worldwide rollout begins in late June 2025 with completion anticipated by late July 2025. As this function prompts routinely with out requiring guide configuration, Microsoft recommends that organizations put together by:

Updating inside safety documentation to reference the brand new detection functionality.

Reviewing Junk folder dealing with insurance policies to make sure alignment with organizational necessities.

Briefing Safety Operations groups on anticipated dashboard adjustments and new detection visibility.

Organizations with compliance necessities ought to be aware that this function modifies e-mail classification and routing processes, introduces new machine studying capabilities, and will have an effect on audit logging visibility for messages redirected to Junk folders.

Microsoft’s Mail Bombing Detection represents a big enhancement to defender capabilities, addressing a particular assault vector that has grown more and more prevalent within the evolving risk panorama.

Energy up early risk detection, escalation, and mitigation with ANY.RUN’s Menace Intelligence Lookup. Get 50 trial searches.

Cyber Security News Tags:Attacks, Block, Bombing, Defender, Email, Microsoft, Office

Post navigation

Previous Post: 1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub
Next Post: PLA Rapidly Deploys AI Technology Across Military Intelligence Operations

Related Posts

VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code Cyber Security News
New KimJongRAT Stealer Using Weaponized LNK File to Deploy Powershell Based Dropper Cyber Security News
Beware of Fake AI Business Tools That Hides Ransomware Cyber Security News
Google Vulnerability Let Attackers Access Any Google User Phone Number Cyber Security News
CISOs Playbook for Managing Boardroom Cybersecurity Concerns Cyber Security News
Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chain IQ, UBS Data Stolen in Ransomware Attack
  • Choosing a Clear Direction in the Face of Growing Cybersecurity Demands
  • Cisco AnyConnect VPN Server Vulnerability Let Attackers Trigger DoS Attack
  • High-Severity Vulnerabilities Patched by Cisco, Atlassian
  • Password Reset Poisoning Attack Allows Account Takeover Using the Password Reset Link

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Chain IQ, UBS Data Stolen in Ransomware Attack
  • Choosing a Clear Direction in the Face of Growing Cybersecurity Demands
  • Cisco AnyConnect VPN Server Vulnerability Let Attackers Trigger DoS Attack
  • High-Severity Vulnerabilities Patched by Cisco, Atlassian
  • Password Reset Poisoning Attack Allows Account Takeover Using the Password Reset Link

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News