New Email Bombing Detection in Office 365 to Detect Email Bombing Attacks

Microsoft is strengthening its cybersecurity arsenal with the introduction of Mail Bombing Detection in Microsoft Defender for Office 365, a sophisticated feature designed to combat the growing threat of email bombing attacks. The new detection type appears prominently in Threat Explorer, Email entity view, Email Summary Panel, and Advanced Hunting capabilities, providing security teams with detailed forensic data and threat intelligence. This automated defense mechanism, rolling out globally from late June through early July 2025, represents a significant advancement in email security infrastructure, providing organizations with enhanced protection against high-volume email floods that can obscure critical communications and overwhelm system resources. We have already notified the implementation of Microsoft Defender for Office 365, which will introduce advanced measures to mitigate email bombing attacks. The feature integrates seamlessly with existing email processing workflows, introducing new detection logic that enhances rather than disrupts current security protocols. The system modifies email message classification and routing processes, potentially affecting Purview capabilities, including audit logging and eDiscovery visibility for messages redirected to Junk folders. Microsoft Defender for Office 365 adds Mail Bombing Detection, rolling out globally in June-July 2025. The system intelligently processes incoming email streams, analyzing patterns and volumes to distinguish legitimate communications from malicious bombing attempts. Automatically blocks email bombing attacks and sends them to the Junk folder without manual setup. Teams can monitor threats through Threat Explorer, Email entity view, and Advanced Hunting tools. When activated, the detection engine automatically routes identified mail-bombing messages to the Junk folder, while maintaining respect for existing Safe Senders settings.

This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 02 Jul 2025 14:15:16 +0000


Cyber News related to New Email Bombing Detection in Office 365 to Detect Email Bombing Attacks

New Email Bombing Detection in Office 365 to Detect Email Bombing Attacks - Microsoft is strengthening its cybersecurity arsenal with the introduction of Mail Bombing Detection in Microsoft Defender for Office 365, a sophisticated feature designed to combat the growing threat of email bombing attacks. The new detection type ...
7 months ago Cybersecuritynews.com
Microsoft Defender for Office 365 now blocks email bombing attacks - In mail bombing attacks, threat actors flood their targets' email inboxes with thousands or tens of thousands of messages within minutes, either by subscribing them to a large number of newsletters or using dedicated cybercrime services that can send ...
7 months ago Bleepingcomputer.com FIN7
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
7 months ago Cybersecuritynews.com
CVE-2022-48826 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
10 Best Anti-Phishing Tools in 2025 - What is Good?What Could Be Better?Real-time email threat detection and response using AI and machine learning.Limited customer support optionsAutomates incident response to stop phishing attacks quickly.The training module is not entirely ...
6 months ago Cybersecuritynews.com
Microsoft: Office 2016 and Office 2019 reach end of support in October - You can also switch to Office 2024, a standalone Office version released in October 2024 for small businesses and consumers without a Microsoft 365 subscription. This version includes locked-in-time versions of Word, Excel, PowerPoint, ...
9 months ago Bleepingcomputer.com
Microsoft 365 To Block Downloaded Excel XLL Add-Ins To Boost Security - Microsoft has recently announced that in order to help improve security, Microsoft 365 is now blocking the download of XLL add-ins for Excel on both Window PCs and Apple Macs. This new feature will be put into effect early 2021, affecting both Office ...
3 years ago Bleepingcomputer.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
2 years ago Esecurityplanet.com
The 6 Best Email Security Software & Tools of 2024 - To guarantee full protection against email threats, important features to consider when picking an email security solution include email filtering and spam detection, sandboxing, mobile support, advanced machine learning, and data loss prevention. ...
1 year ago Esecurityplanet.com
10 Best Email Security Gateways in 2025 - Barracuda Email Security Gateway is a solution that helps protect organizations from email-borne threats such as spam, viruses, phishing, and other malicious content. It uses various methods, including filtering, encryption, and sandboxing, to ...
11 months ago Cybersecuritynews.com
Microsoft Office 2024 now available for Windows and macOS users - As announced earlier in September, starting in Office 2024, Microsoft will also turn off ActiveX controls by default in Word, Excel, PowerPoint, and Visio client apps, a measure likely prompted by ActiveX's well-known security issues. Last month, ...
1 year ago Bleepingcomputer.com
Veeam adds BaaS capabilities for Veeam Backup for Microsoft 365 - Veeam Software has expanded its relationship with Microsoft. Veeam is making it easier for customers to protect Microsoft 365 with Cirrus by Veeam which brings the ease and flexibility of Backup-as-a-Service for Microsoft 365. Utilizing the power and ...
2 years ago Helpnetsecurity.com
10 Best EDR Tools ( Endpoint Detection & Response) - 2025 - What is good?What Could Be Better ?Provides comprehensive endpoint monitoring.Some users might find the installation and configuration process of the solution tedious.Protect your entire security stack with in-depth threat intelligence.Some users ...
10 months ago Cybersecuritynews.com
Microsoft launches ad-supported Office apps for Windows users - Microsoft has released ad-supported versions of its Office desktop apps, which have limited features but allow Windows users to edit their documents for free. While Microsoft allows customers to use Word, Excel, PowerPoint, and other Microsoft ...
11 months ago Bleepingcomputer.com
Microsoft blocks ActiveX by default in Microsoft 365, Office 2024 - Microsoft also warned Office users in a separate support document not to open unexpected file attachments or change ActiveX settings when prompted by random pop-ups and unknown people. Microsoft announced it will begin disabling all ActiveX controls ...
9 months ago Bleepingcomputer.com
How To Use YARA Rules To Identify Financial Sector Targeted Attacks - By analyzing multiple samples from the same malware family, security teams can create YARA rules that identify various iterations of the threat, even as attackers attempt to modify their code to evade detection. By scanning network traffic for ...
9 months ago Cybersecuritynews.com Hunters
Email Security Trends And Predictions in 2024 - One of the most critical aspects of this broad topic is email security. Email security refers to the collective measures used to secure the access and content of an email account or service. An email service provider implements email security to ...
2 years ago Cybersecuritynews.com
Top 10 XDR (Extended Detection & Response) Solutions - 2025 - CrowdStrike Falcon XDR uses this data to extend EDR outcomes and advanced threat detection across the security stack, thereby stopping breaches more quickly. It does this by using CrowdStrike’s world-class machine learning, artificial ...
10 months ago Cybersecuritynews.com
Beware: PayPal "New Address" feature abused to send phishing emails - The email includes the new address that was allegedly added to your PayPal account, including a message claiming to be a purchase confirmation for a MacBook M4, and to call the enclosed PayPal number if you did not authorize the purchase. The goal of ...
11 months ago Bleepingcomputer.com
Target-rich environment: Why Microsoft 365 has become the biggest risk - Microsoft 365 has become a prime target for cyber attackers due to its widespread adoption and the vast amount of sensitive data it hosts. This article explores why Microsoft 365 environments are considered high-risk and the factors contributing to ...
4 months ago Bleepingcomputer.com
New NightShadeC2 Botnet Uses UAC Prompt Bombing to Evade Detection - A new botnet named NightShadeC2 has been discovered employing a novel technique called UAC prompt bombing to bypass User Account Control (UAC) defenses on Windows systems. This innovative approach overwhelms the UAC prompts, effectively desensitizing ...
5 months ago Cybersecuritynews.com
Microsoft deprecates Defender Application Guard for Office - Microsoft is deprecating Defender Application Guard for Office and the Windows Security Isolation APIs, and it recommends Defender for Endpoint attack surface reduction rules, Protected View, and Windows Defender Application Control as an ...
2 years ago Bleepingcomputer.com
Microsoft fixes Outlook Desktop crashes when sending emails - Microsoft has fixed a known issue causing Outlook Desktop clients to crash when sending emails from Outlook.com accounts. These problems were first reported on Microsoft's community website and other social networks by customers saying they were ...
2 years ago Bleepingcomputer.com
Ai, Cybersecurity Awareness, And Communication - We're only beginning to see the scope of these attacks and the approaches attackers are developing because of this technology. The rapid advancements in AI technology have opened up new avenues for attackers to exploit vulnerabilities and launch ...
2 years ago Cyberdefensemagazine.com
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
10 months ago Cybersecuritynews.com