Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Defender for Office 365 to Block Email Bombing Attacks

Posted on June 18, 2025June 18, 2025 By CWS

Microsoft has introduced a brand new safety functionality inside its Defender for Workplace 365 suite aimed toward combating the rising risk of e-mail bombing assaults. 

The function, formally labeled “Mail Bombing Detection,” will routinely determine and quarantine high-volume e-mail flooding campaigns that try and overwhelm person inboxes or obscure respectable messages. 

This know-how enhancement will likely be deployed globally between late June and July 2025, offering organizations with improved safety towards this more and more frequent assault vector with out requiring further configuration from safety groups.

E-mail Bombing Threats and Detection Mechanisms

E-mail bombing represents a complicated type of cybersecurity risk the place attackers flood goal mailboxes with terribly excessive volumes of messages in brief timeframes. 

These assaults serve twin malicious functions: overwhelming e-mail infrastructure and burying necessary respectable communications beneath waves of junk content material. 

Microsoft’s new detection know-how employs superior machine studying algorithms to determine patterns in step with bombing campaigns, distinguishing them from regular high-volume respectable e-mail visitors akin to newsletters or advertising and marketing communications.

The system works by analyzing message velocity, sender status metrics, and content material similarity elements throughout the Microsoft 365 defender platform. 

When suspicious patterns emerge, the MailBombingDetection module triggers defensive protocols that routinely route recognized messages to customers’ Junk folders. 

Microsoft engineers have developed this technique to respect current Secure Sender configurations, making certain that licensed high-volume senders stay unaffected by the brand new safety layer.

Safety Operations groups will achieve visibility into e-mail bombing assaults by way of a number of interfaces inside the Microsoft Defender portal. 

The brand new detection sort will likely be prominently displayed in Menace Explorer (ThreatExplorer.Motion == “MailBombing”), E-mail Entity View, and the E-mail Abstract Panel. For organizations utilizing programmatic safety monitoring, the detections may also be accessible by way of Superior Looking queries utilizing KQL (Kusto Question Language).

This integration ensures seamless incorporation into current safety workflows and reporting mechanisms, permitting organizations to keep up complete visibility throughout their risk panorama.

The worldwide rollout begins in late June 2025 with completion anticipated by late July 2025. As this function prompts routinely with out requiring guide configuration, Microsoft recommends that organizations put together by:

Updating inside safety documentation to reference the brand new detection functionality.

Reviewing Junk folder dealing with insurance policies to make sure alignment with organizational necessities.

Briefing Safety Operations groups on anticipated dashboard adjustments and new detection visibility.

Organizations with compliance necessities ought to be aware that this function modifies e-mail classification and routing processes, introduces new machine studying capabilities, and will have an effect on audit logging visibility for messages redirected to Junk folders.

Microsoft’s Mail Bombing Detection represents a big enhancement to defender capabilities, addressing a particular assault vector that has grown more and more prevalent within the evolving risk panorama.

Energy up early risk detection, escalation, and mitigation with ANY.RUN’s Menace Intelligence Lookup. Get 50 trial searches.

Cyber Security News Tags:Attacks, Block, Bombing, Defender, Email, Microsoft, Office

Post navigation

Previous Post: 1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub
Next Post: PLA Rapidly Deploys AI Technology Across Military Intelligence Operations

Related Posts

Dutch Intelligence Exposes Russian “Laundry Bear” Cyber Group Behind Police Hack Cyber Security News
CISOs Guide to Regulatory Compliance in Global Landscapes Cyber Security News
New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches Cyber Security News
CISA Releases Guide to Protect Network Edge Devices From Hackers Cyber Security News
CISA Adds MDaemon Email Server XSS Vulnerability to KEV Catalog Following Exploitation Cyber Security News
Hackers Allegedly Claim Breach of Scania Financial Services, Sensitive Data Stolen Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions
  • Hacking Xiaomi Smartwatch Using Touch Point to Find Unlock PIN coordinates
  • How to Detect SQL Injection Vulnerabilities
  • Russian Hackers Bypass Gmail MFA with App Specific Password Ruse
  • Halo Security Honored with 2025 MSP Today Product of the Year Award

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions
  • Hacking Xiaomi Smartwatch Using Touch Point to Find Unlock PIN coordinates
  • How to Detect SQL Injection Vulnerabilities
  • Russian Hackers Bypass Gmail MFA with App Specific Password Ruse
  • Halo Security Honored with 2025 MSP Today Product of the Year Award

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News