Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Defender for Office 365 to Block Email Bombing Attacks

Posted on June 18, 2025June 18, 2025 By CWS

Microsoft has introduced a brand new safety functionality inside its Defender for Workplace 365 suite aimed toward combating the rising risk of e-mail bombing assaults. 

The function, formally labeled “Mail Bombing Detection,” will routinely determine and quarantine high-volume e-mail flooding campaigns that try and overwhelm person inboxes or obscure respectable messages. 

This know-how enhancement will likely be deployed globally between late June and July 2025, offering organizations with improved safety towards this more and more frequent assault vector with out requiring further configuration from safety groups.

E-mail Bombing Threats and Detection Mechanisms

E-mail bombing represents a complicated type of cybersecurity risk the place attackers flood goal mailboxes with terribly excessive volumes of messages in brief timeframes. 

These assaults serve twin malicious functions: overwhelming e-mail infrastructure and burying necessary respectable communications beneath waves of junk content material. 

Microsoft’s new detection know-how employs superior machine studying algorithms to determine patterns in step with bombing campaigns, distinguishing them from regular high-volume respectable e-mail visitors akin to newsletters or advertising and marketing communications.

The system works by analyzing message velocity, sender status metrics, and content material similarity elements throughout the Microsoft 365 defender platform. 

When suspicious patterns emerge, the MailBombingDetection module triggers defensive protocols that routinely route recognized messages to customers’ Junk folders. 

Microsoft engineers have developed this technique to respect current Secure Sender configurations, making certain that licensed high-volume senders stay unaffected by the brand new safety layer.

Safety Operations groups will achieve visibility into e-mail bombing assaults by way of a number of interfaces inside the Microsoft Defender portal. 

The brand new detection sort will likely be prominently displayed in Menace Explorer (ThreatExplorer.Motion == “MailBombing”), E-mail Entity View, and the E-mail Abstract Panel. For organizations utilizing programmatic safety monitoring, the detections may also be accessible by way of Superior Looking queries utilizing KQL (Kusto Question Language).

This integration ensures seamless incorporation into current safety workflows and reporting mechanisms, permitting organizations to keep up complete visibility throughout their risk panorama.

The worldwide rollout begins in late June 2025 with completion anticipated by late July 2025. As this function prompts routinely with out requiring guide configuration, Microsoft recommends that organizations put together by:

Updating inside safety documentation to reference the brand new detection functionality.

Reviewing Junk folder dealing with insurance policies to make sure alignment with organizational necessities.

Briefing Safety Operations groups on anticipated dashboard adjustments and new detection visibility.

Organizations with compliance necessities ought to be aware that this function modifies e-mail classification and routing processes, introduces new machine studying capabilities, and will have an effect on audit logging visibility for messages redirected to Junk folders.

Microsoft’s Mail Bombing Detection represents a big enhancement to defender capabilities, addressing a particular assault vector that has grown more and more prevalent within the evolving risk panorama.

Energy up early risk detection, escalation, and mitigation with ANY.RUN’s Menace Intelligence Lookup. Get 50 trial searches.

Cyber Security News Tags:Attacks, Block, Bombing, Defender, Email, Microsoft, Office

Post navigation

Previous Post: 1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub
Next Post: PLA Rapidly Deploys AI Technology Across Military Intelligence Operations

Related Posts

CoinDCX Hacked – $44.2 million Wiped off From the Platform Cyber Security News
Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads Cyber Security News
LLM-Based LAMEHUG Malware Dynamically Generate Commands for Reconnaissance and Data Theft Cyber Security News
APT Sidewinder Spoofs Government and Military Institutions to Steal Login Credentials Cyber Security News
Lumma Password Stealer Attack Infection Chain and Its Escalation Tactics Uncovered Cyber Security News
Windows Defender Vulnerability Allows Service Hijacking and Disablement via Symbolic Link Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New ‘SleepyDuck’ Malware in Open VSX Marketplace Allow Attackers to Control Windows Systems Remotely
  • A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
  • Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks
  • Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks
  • Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New ‘SleepyDuck’ Malware in Open VSX Marketplace Allow Attackers to Control Windows Systems Remotely
  • A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
  • Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks
  • Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks
  • Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News