Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Unveils European Security Initiative to Target Cybercriminal Networks

Posted on June 6, 2025June 6, 2025 By CWS

To fight malicious actors throughout Europe, Microsoft has launched a complete European Safety Program designed to deal with refined cybercriminal networks focusing on European infrastructure.

Introduced in Berlin on June 4, 2025, the initiative particularly targets ransomware teams and state-sponsored menace actors from Russia, China, Iran, and North Korea, who proceed to evolve in scope and class.

AI-Powered Menace Intelligence Operations 

This system leverages synthetic intelligence to reinforce menace detection and intelligence sharing with European governments throughout all 27 EU member states, accession nations, EFTA members, the UK, Monaco, and the Vatican. 

Microsoft’s Authorities Safety Program (GSP) will now present real-time, AI-tailored menace intelligence to assist governments perceive evolving assault vectors and nation-state ways. 

The corporate has noticed menace actors utilizing AI for reconnaissance, vulnerability analysis, LLM-refined operational command strategies, detection evasion, and social engineering assaults.

Microsoft’s Menace Evaluation Heart (MTAC) employs AI algorithms to determine commonalities throughout overseas affect operations, notably these using deepfake artificial media to deceive European audiences. 

The improved intelligence sharing contains structured applications such because the Microsoft Safety Replace Information and Defender Vulnerability Administration, offering prioritized safety communications and vulnerability remediation steerage to collaborating governments.

Automated Disruption Applied sciences 

A cornerstone of the dismantling effort is Microsoft’s newly launched Statutory Automated Disruption (SAD) Program, carried out in April 2025, which automates authorized abuse notifications to internet hosting suppliers for sooner elimination of malicious domains and IP addresses. 

This technology-driven strategy considerably raises operational prices for cybercriminals and reduces their capacity to scale assaults throughout European networks.

This system’s effectiveness was demonstrated within the current takedown of Lumma, a prolific infostealer malware that contaminated practically 400,000 gadgets globally inside two months, with a major European impression. 

The Digital Crimes Unit (DCU), in collaboration with Europol, efficiently seized or blocked over 2,300 command-and-control domains, severely disrupting the malware’s infrastructure. 

Spain, France, Italy, and Germany represented the very best sufferer counts in Europe throughout the Lumma operation.

Microsoft’s expanded partnership framework contains embedding DCU investigators at Europol’s European Cybercrime Centre (EC3) headquarters in The Hague to reinforce operational coordination and allow joint investigations. 

The corporate has traditionally filed seven authorized actions since 2016 in opposition to nation-state actors, internally designated by weather-themed codenames: Blizzard (Russia), Hurricane (China), Sandstorm (Iran), and Sleet (North Korea).

The latest disruption focused Russian actor Star Blizzard in September 2024, ensuing within the seizure of over 140 malicious domains and forcing important operational adjustments to the menace group’s assault methodology. 

The initiative extends to the Western Balkans via collaboration with the Western Balkans Cyber Capability Centre (WB3C), addressing cybersecurity gaps in areas the place malicious actors search to destabilize EU-bordering nations.

Microsoft’s three-year partnership with the CyberPeace Institute continues to help NGO cybersecurity efforts, with practically 100 Microsoft staff volunteering experience to hint ransomware origins and determine menace actor secure havens.

Velocity up and enrich menace investigations with Menace Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:Cybercriminal, European, Initiative, Microsoft, Networks, Security, Target, Unveils

Post navigation

Previous Post: Empower Users and Protect Against GenAI Data Loss
Next Post: In Other News: FBI Warns of BadBox 2, NSO Disputes WhatsApp Fine, 1,000 Leave CISA

Related Posts

New NFC-Driven PhantomCard Android Malware Attacking Banking Users Cyber Security News
Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites Cyber Security News
A Milestone Powering Crypto’s Global Reach Cyber Security News
17,000+ Fake News Websites Caught Promoting Investment Frauds Cyber Security News
LapDogs Hackers Leverages 1,000 SOHO Devices Using a Custom Backdoor to Act Covertly Cyber Security News
Apple Hints That iPhone 17 Is to Eliminate the Physical SIM Card Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News