Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Unveils European Security Initiative to Target Cybercriminal Networks

Posted on June 6, 2025June 6, 2025 By CWS

To fight malicious actors throughout Europe, Microsoft has launched a complete European Safety Program designed to deal with refined cybercriminal networks focusing on European infrastructure.

Introduced in Berlin on June 4, 2025, the initiative particularly targets ransomware teams and state-sponsored menace actors from Russia, China, Iran, and North Korea, who proceed to evolve in scope and class.

AI-Powered Menace Intelligence Operations 

This system leverages synthetic intelligence to reinforce menace detection and intelligence sharing with European governments throughout all 27 EU member states, accession nations, EFTA members, the UK, Monaco, and the Vatican. 

Microsoft’s Authorities Safety Program (GSP) will now present real-time, AI-tailored menace intelligence to assist governments perceive evolving assault vectors and nation-state ways. 

The corporate has noticed menace actors utilizing AI for reconnaissance, vulnerability analysis, LLM-refined operational command strategies, detection evasion, and social engineering assaults.

Microsoft’s Menace Evaluation Heart (MTAC) employs AI algorithms to determine commonalities throughout overseas affect operations, notably these using deepfake artificial media to deceive European audiences. 

The improved intelligence sharing contains structured applications such because the Microsoft Safety Replace Information and Defender Vulnerability Administration, offering prioritized safety communications and vulnerability remediation steerage to collaborating governments.

Automated Disruption Applied sciences 

A cornerstone of the dismantling effort is Microsoft’s newly launched Statutory Automated Disruption (SAD) Program, carried out in April 2025, which automates authorized abuse notifications to internet hosting suppliers for sooner elimination of malicious domains and IP addresses. 

This technology-driven strategy considerably raises operational prices for cybercriminals and reduces their capacity to scale assaults throughout European networks.

This system’s effectiveness was demonstrated within the current takedown of Lumma, a prolific infostealer malware that contaminated practically 400,000 gadgets globally inside two months, with a major European impression. 

The Digital Crimes Unit (DCU), in collaboration with Europol, efficiently seized or blocked over 2,300 command-and-control domains, severely disrupting the malware’s infrastructure. 

Spain, France, Italy, and Germany represented the very best sufferer counts in Europe throughout the Lumma operation.

Microsoft’s expanded partnership framework contains embedding DCU investigators at Europol’s European Cybercrime Centre (EC3) headquarters in The Hague to reinforce operational coordination and allow joint investigations. 

The corporate has traditionally filed seven authorized actions since 2016 in opposition to nation-state actors, internally designated by weather-themed codenames: Blizzard (Russia), Hurricane (China), Sandstorm (Iran), and Sleet (North Korea).

The latest disruption focused Russian actor Star Blizzard in September 2024, ensuing within the seizure of over 140 malicious domains and forcing important operational adjustments to the menace group’s assault methodology. 

The initiative extends to the Western Balkans via collaboration with the Western Balkans Cyber Capability Centre (WB3C), addressing cybersecurity gaps in areas the place malicious actors search to destabilize EU-bordering nations.

Microsoft’s three-year partnership with the CyberPeace Institute continues to help NGO cybersecurity efforts, with practically 100 Microsoft staff volunteering experience to hint ransomware origins and determine menace actor secure havens.

Velocity up and enrich menace investigations with Menace Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:Cybercriminal, European, Initiative, Microsoft, Networks, Security, Target, Unveils

Post navigation

Previous Post: Empower Users and Protect Against GenAI Data Loss
Next Post: In Other News: FBI Warns of BadBox 2, NSO Disputes WhatsApp Fine, 1,000 Leave CISA

Related Posts

17,000+ Fake News Websites Caught Promoting Investment Frauds Cyber Security News
Real-Time Threat Intelligence for Proactive Cyber Defense in 2025 Cyber Security News
Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux Cyber Security News
Encrypting Data to Meet Global Privacy Law Requirements Cyber Security News
Dark Web Travel Agencies Offering Cheap Travel Deals to Steal Credit Card Data Cyber Security News
Threat Actors Weaponizing Facebook Ads to Deliver Malware and Stealing Wallet Passwords Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Weaponized LNK File Disguised as Credit Card Security Email Steals User Data
  • How to Recognize Fake Reviews and Scams
  • Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files
  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Weaponized LNK File Disguised as Credit Card Security Email Steals User Data
  • How to Recognize Fake Reviews and Scams
  • Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files
  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News