Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    You don’t have to explain everything to Claude anymore – it’s finally in your apps

    UK launches vulnerability research program for external experts

    Interlock ransomware adopts FileFix method to deliver malware

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      AI chatbot Grok issues apology for antisemitic posts

      July 13, 2025

      Apple sued by shareholders for allegedly overstating AI progress

      June 22, 2025

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025
    • Business

      Cloudflare open-sources Orange Meets with End-to-End encryption

      June 29, 2025

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025
    • Crypto

      3 LetsBONK.fun Ecosystem Tokens To Watch For the Third Week of July

      July 14, 2025

      Bank of England Chief Sounds Alarm on Big Bank Stablecoin Issuance

      July 14, 2025

      XRP Rally Is Being Driven By South Korean Traders

      July 14, 2025

      Analyst Says MicroStrategy Could Trigger a Bitcoin Cascade Worse Than Mt. Gox or 3AC

      July 14, 2025

      Pudgy Penguins (PENGU) Skyrockets as Justin Sun Joins the Huddle

      July 14, 2025
    • Technology

      You don’t have to explain everything to Claude anymore – it’s finally in your apps

      July 15, 2025

      UK launches vulnerability research program for external experts

      July 15, 2025

      Interlock ransomware adopts FileFix method to deliver malware

      July 15, 2025

      Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot

      July 15, 2025

      Malicious VSCode extension in Cursor IDE led to $500K crypto theft

      July 15, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»Microsoft Defender for Office 365 now blocks email bombing attacks
    Technology

    Microsoft Defender for Office 365 now blocks email bombing attacks

    TechAiVerseBy TechAiVerseJuly 1, 2025No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Microsoft Defender for Office 365 now blocks email bombing attacks
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Microsoft Defender for Office 365 now blocks email bombing attacks

    Microsoft says its Defender for Office 365 cloud-based email security suite will now automatically detect and block email bombing attacks.

    Defender for Office 365 (formerly known as Office 365 Advanced Threat Protection or Office 365 ATP) protects organizations operating in high-risk industries and dealing with sophisticated threat actors from malicious threats from email messages, links, and collaboration tools.

    “We’re introducing a new detection capability in Microsoft Defender for Office 365 to help protect your organization from a growing threat known as email bombing,” Redmond explains in a Microsoft 365 message center update.

    “This form of abuse floods mailboxes with high volumes of email to obscure important messages or overwhelm systems. The new ‘Mail Bombing’ detection will automatically identify and block these attacks, helping security teams maintain visibility into real threats.”

    The new ‘Mail Bombing’ feature started rolling out in late June 2025 and is expected to reach all organizations by late July. It will be toggled on by default, requires no manual configuration, and will automatically send all messages identified as part of a mail bombing campaign to the Junk folder.

    As the company explained over the weekend, Mail Bombing is now available for security operations analysts and administrators as a new detection type in Threat Explorer, the Email entity page, the Email summary panel, and Advanced Hunting.

    In mail bombing attacks, threat actors flood their targets’ email inboxes with thousands or tens of thousands of messages within minutes, either by subscribing them to a large number of newsletters or using dedicated cybercrime services that can send a massive number of emails.

    In most cases, the attackers’ ultimate goal is to overload email security systems as part of social engineering schemes, paving the way to malware or ransomware attacks that can help exfiltrate sensitive data from victims’ compromised systems.

    Email bombing has been employed in attacks by various cybercrime and ransomware groups for over a year. It began with the BlackBasta gang, which used this tactic to fill their victims’ mailboxes with emails within minutes before launching their attacks.

    They would follow up with voice phishing cold calls, posing as their IT support teams to trick overwhelmed employees into granting remote access to their devices using AnyDesk or the built-in Windows Quick Assist tool.

    After infiltrating their systems, the attackers would deploy various malicious tools and malware implants, enabling them to move laterally through corporate networks before deploying ransomware payloads.

    More recently, email bombing has been adopted by a 3AM ransomware affiliate and cybercriminals linked to the FIN7 group, who have also spoofed IT support in social engineering attacks aimed at persuading employees to give up their credentials for remote access to corporate systems.

    Why IT teams are ditching manual patch management

    Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore.

    In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work — no complex scripts required.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleSwitzerland says government data stolen in ransomware attack
    Next Article Germany asks Google, Apple to remove DeepSeek AI from app stores
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    You don’t have to explain everything to Claude anymore – it’s finally in your apps

    July 15, 2025

    UK launches vulnerability research program for external experts

    July 15, 2025

    Interlock ransomware adopts FileFix method to deliver malware

    July 15, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202528 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202522 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202520 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202520 Views
    Don't Miss
    Technology July 15, 2025

    You don’t have to explain everything to Claude anymore – it’s finally in your apps

    You don’t have to explain everything to Claude anymore – it’s finally in your apps…

    UK launches vulnerability research program for external experts

    Interlock ransomware adopts FileFix method to deliver malware

    Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    You don’t have to explain everything to Claude anymore – it’s finally in your apps

    July 15, 20252 Views

    UK launches vulnerability research program for external experts

    July 15, 20252 Views

    Interlock ransomware adopts FileFix method to deliver malware

    July 15, 20252 Views
    Most Popular

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.