home.social

#microsoftteams — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #microsoftteams, aggregated by home.social.

  1. Erst Signal, jetzt Teams.

    "Cybercriminals have increasingly adopted Microsoft Teams in attacks, reaching out to company employees and pretending to be IT and help-desk staff.
    The victims are convinced to run a malicious PowerShell command on their systems, which deploys the “ModeloRAT” malware."

    bleepingcomputer.com/news/secu

    #MicrosoftTeams #cybersecurity #SocialEngineering #malware

  2. Jabra PanaCast U30 Video Bar Simplifies Video Meetings In Small Rooms

    The new Jabra Panacast U30 is a video and soundbar for holding hybrid meetings in smaller meeting rooms…
    #NewsBeep #News #Technology #AU #Australia #BYOD #Huddlespaces #meetingrooms #Microsoft #MicrosoftTeams #USB #Videobar #zoom
    newsbeep.com/au/665992/

  3. Jabra PanaCast U30 Video Bar Simplifies Video Meetings In Small Rooms

    The new Jabra Panacast U30 is a video and soundbar for holding hybrid meetings in smaller meeting rooms…
    #NewsBeep #News #Technology #AU #Australia #BYOD #Huddlespaces #meetingrooms #Microsoft #MicrosoftTeams #USB #Videobar #zoom
    newsbeep.com/au/665992/

  4. Mein #arbeitgeber labert grade in so nem #MicrosoftTeams Call für alle Mitarbeiter was von #digitalesouveranitat und dann soll ich MEHR mit #microsoft #github #copilot machen. Und selbstverständlich wird ALLES #ai. Sogar unsere TLD wechselt von .net auf .ai.
    Wir sollen ganz explizit doch bitte #ki in die tägliche #Arbeit einbinden, der Vertrieb soll sich beim. Aber bloß "unsere" nutzen, wegen den Daten. Muss mich gleich mal informieren, ob #localLLMs erlaubt sind.
    hessen.social/@Moonstone2487/1

  5. MuddyWater usa il ransomware Chaos come falsa bandiera: l’Iran maschera lo spionaggio di Stato da cybercrime

    Il gruppo APT iraniano MuddyWater ha condotto un'operazione di cyberspionaggio mascherandola da attacco ransomware Chaos. Rapid7 rivela come Microsoft Teams sia stato usato per rubare credenziali e bypassare l'MFA, con il vero obiettivo di esfiltrazione dati e persistenza a lungo termine: non l'estorsione finanziaria.

    insicurezzadigitale.com/muddyw

  6. What if we told Nextcloud Talk can do what #MicrosoftTeams does AND so much more? �

    Join our webinar to see how #NextcloudTalk compares to Microsoft Teams:
    ✔ More secure
    ✔ Feature-rich
    ✔ Full data control

    📅 May 21, 2 PM CEST

    Save your spot 👇
    go.nextcloud.com/r/B8y0

  7. Lorem Ipsum Malware: Trojanized MS Teams Installers

    An emerging threat group is conducting a global SEO-poisoning campaign distributing trojanized Microsoft Teams installers that deploy a multi-stage shellcode loader and backdoor designated Lorem Ipsum. Active since February 2026, the campaign targets users searching for Microsoft Teams across six countries, with confirmed targeting of a US healthcare organization. The operators evolved rapidly from minimally obfuscated test builds to sophisticated loaders featuring substitution cipher decoding, XOR-encrypted shellcode, DLL sideloading, and JFIF-disguised C2 traffic. The malware distinctively abuses letsdiskuss[.]com, a legitimate India-based platform, as a dead-drop resolver for C2 infrastructure. Attackers use validly signed MSI installers with three-day Microsoft ID Verified certificates, NameCheap-registered infrastructure weaponized within hours, and per-victim UUID-tracked callbacks. Development velocity suggests possible LLM-assisted tooling, indicating a well-funded mid-tier criminal actor operating...

    Pulse ID: 69f92fedbdf318f94db2fc63
    Pulse Link: otx.alienvault.com/pulse/69f92
    Pulse Author: AlienVault
    Created: 2026-05-04 23:46:53

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #CyberSecurity #Healthcare #India #InfoSec #Malware #Microsoft #MicrosoftTeams #Namecheap #Nim #OTX #OpenThreatExchange #RAT #ShellCode #SideLoading #Trojan #bot #AlienVault

  8. Lorem Ipsum Malware: Trojanized MS Teams Installers

    An emerging threat group is conducting a global SEO-poisoning campaign distributing trojanized Microsoft Teams installers that deploy a multi-stage shellcode loader and backdoor designated Lorem Ipsum. Active since February 2026, the campaign targets users searching for Microsoft Teams across six countries, with confirmed targeting of a US healthcare organization. The operators evolved rapidly from minimally obfuscated test builds to sophisticated loaders featuring substitution cipher decoding, XOR-encrypted shellcode, DLL sideloading, and JFIF-disguised C2 traffic. The malware distinctively abuses letsdiskuss[.]com, a legitimate India-based platform, as a dead-drop resolver for C2 infrastructure. Attackers use validly signed MSI installers with three-day Microsoft ID Verified certificates, NameCheap-registered infrastructure weaponized within hours, and per-victim UUID-tracked callbacks. Development velocity suggests possible LLM-assisted tooling, indicating a well-funded mid-tier criminal actor operating...

    Pulse ID: 69f92fedbdf318f94db2fc63
    Pulse Link: otx.alienvault.com/pulse/69f92
    Pulse Author: AlienVault
    Created: 2026-05-04 23:46:53

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #CyberSecurity #Healthcare #India #InfoSec #Malware #Microsoft #MicrosoftTeams #Namecheap #Nim #OTX #OpenThreatExchange #RAT #ShellCode #SideLoading #Trojan #bot #AlienVault

  9. Lorem Ipsum Malware: Trojanized MS Teams Installers

    An emerging threat group is conducting a global SEO-poisoning campaign distributing trojanized Microsoft Teams installers that deploy a multi-stage shellcode loader and backdoor designated Lorem Ipsum. Active since February 2026, the campaign targets users searching for Microsoft Teams across six countries, with confirmed targeting of a US healthcare organization. The operators evolved rapidly from minimally obfuscated test builds to sophisticated loaders featuring substitution cipher decoding, XOR-encrypted shellcode, DLL sideloading, and JFIF-disguised C2 traffic. The malware distinctively abuses letsdiskuss[.]com, a legitimate India-based platform, as a dead-drop resolver for C2 infrastructure. Attackers use validly signed MSI installers with three-day Microsoft ID Verified certificates, NameCheap-registered infrastructure weaponized within hours, and per-victim UUID-tracked callbacks. Development velocity suggests possible LLM-assisted tooling, indicating a well-funded mid-tier criminal actor operating...

    Pulse ID: 69f92fedbdf318f94db2fc63
    Pulse Link: otx.alienvault.com/pulse/69f92
    Pulse Author: AlienVault
    Created: 2026-05-04 23:46:53

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #CyberSecurity #Healthcare #India #InfoSec #Malware #Microsoft #MicrosoftTeams #Namecheap #Nim #OTX #OpenThreatExchange #RAT #ShellCode #SideLoading #Trojan #bot #AlienVault

  10. Lorem Ipsum Malware: Trojanized MS Teams Installers

    An emerging threat group is conducting a global SEO-poisoning campaign distributing trojanized Microsoft Teams installers that deploy a multi-stage shellcode loader and backdoor designated Lorem Ipsum. Active since February 2026, the campaign targets users searching for Microsoft Teams across six countries, with confirmed targeting of a US healthcare organization. The operators evolved rapidly from minimally obfuscated test builds to sophisticated loaders featuring substitution cipher decoding, XOR-encrypted shellcode, DLL sideloading, and JFIF-disguised C2 traffic. The malware distinctively abuses letsdiskuss[.]com, a legitimate India-based platform, as a dead-drop resolver for C2 infrastructure. Attackers use validly signed MSI installers with three-day Microsoft ID Verified certificates, NameCheap-registered infrastructure weaponized within hours, and per-victim UUID-tracked callbacks. Development velocity suggests possible LLM-assisted tooling, indicating a well-funded mid-tier criminal actor operating...

    Pulse ID: 69f92fedbdf318f94db2fc63
    Pulse Link: otx.alienvault.com/pulse/69f92
    Pulse Author: AlienVault
    Created: 2026-05-04 23:46:53

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #CyberSecurity #Healthcare #India #InfoSec #Malware #Microsoft #MicrosoftTeams #Namecheap #Nim #OTX #OpenThreatExchange #RAT #ShellCode #SideLoading #Trojan #bot #AlienVault

  11. Lorem Ipsum Malware: Trojanized MS Teams Installers

    An emerging threat group is conducting a global SEO-poisoning campaign distributing trojanized Microsoft Teams installers that deploy a multi-stage shellcode loader and backdoor designated Lorem Ipsum. Active since February 2026, the campaign targets users searching for Microsoft Teams across six countries, with confirmed targeting of a US healthcare organization. The operators evolved rapidly from minimally obfuscated test builds to sophisticated loaders featuring substitution cipher decoding, XOR-encrypted shellcode, DLL sideloading, and JFIF-disguised C2 traffic. The malware distinctively abuses letsdiskuss[.]com, a legitimate India-based platform, as a dead-drop resolver for C2 infrastructure. Attackers use validly signed MSI installers with three-day Microsoft ID Verified certificates, NameCheap-registered infrastructure weaponized within hours, and per-victim UUID-tracked callbacks. Development velocity suggests possible LLM-assisted tooling, indicating a well-funded mid-tier criminal actor operating...

    Pulse ID: 69f92fedbdf318f94db2fc63
    Pulse Link: otx.alienvault.com/pulse/69f92
    Pulse Author: AlienVault
    Created: 2026-05-04 23:46:53

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #CyberSecurity #Healthcare #India #InfoSec #Malware #Microsoft #MicrosoftTeams #Namecheap #Nim #OTX #OpenThreatExchange #RAT #ShellCode #SideLoading #Trojan #bot #AlienVault

  12. iX-Workshop: Microsoft Teams sicher und effizient administrieren

    Lernen Sie, wie Sie mit Microsoft Teams eine sichere und effiziente Arbeitsumgebung einrichten, verwalten und an die Bedürfnisse des Unternehmens anpassen.

    heise.de/news/iX-Workshop-Micr

    #DSGVO #IT #iXWorkshops #MicrosoftTeams #SharePoint #news

  13. Hello everyone—how’s it going?

    Quick question for my Windows crew, especially folks using NVDA: what email client are you using these days? I’m looking for something that plays nicely with Microsoft Teams and Zoom.

    Also curious… how’s the new Outlook holding up in 2026? Has accessibility improved, or is it still hit or miss?

    Would love to hear what’s working well for you.

    #Windows #NVDA #ScreenReader #Accessibility #BlindTech #AssistiveTechnology #Outlook #EmailClients #MicrosoftTeams #Zoom

  14. 《[...] Funktion zum jetzigen Zeitpunkt erst in Entwicklung [...]》
    — gefühlt eine Funktion, die schon vor 20 Jahren nützlich gewesen wäre

    #MicrosoftTeams bekommt Mikrofontest vor Meeting-Beitritt | heise online heise.de/news/Test-Test-1-2-3- #Microsoft #VideoConferencing

  15. Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite

    Google Threat Intelligence Group identified a sophisticated intrusion campaign by UNC6692 that combined persistent social engineering with custom malware. The attackers impersonated IT helpdesk personnel via Microsoft Teams, leveraging initial email spam campaigns to create urgency. Victims were tricked into downloading AutoHotKey scripts that installed SNOWBELT, a malicious browser extension establishing persistence through scheduled tasks. The modular SNOW ecosystem enabled deep network penetration: SNOWBELT provided initial access, SNOWGLAZE created encrypted WebSocket tunnels masking traffic as legitimate cloud communications, and SNOWBASIN functioned as a local backdoor for command execution. UNC6692 performed internal reconnaissance, escalated privileges by extracting LSASS memory, and used Pass-The-Hash techniques to access domain controllers. The operation culminated in exfiltration of Active Directory databases and credentials via LimeWire, demonstrating advanced tradecraft abusing legitimate clou...

    Pulse ID: 69ea72434c655fab0cee36d8
    Pulse Link: otx.alienvault.com/pulse/69ea7
    Pulse Author: AlienVault
    Created: 2026-04-23 19:25:55

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #Browser #Cloud #CyberSecurity #DomainController #Email #Google #InfoSec #Malware #Microsoft #MicrosoftTeams #OTX #OpenThreatExchange #RAT #SocialEngineering #Spam #Troll #bot #AlienVault

  16. UNC6692 Exposes Custom Malware Suite via Social Engineering

    In a clever social engineering ploy, UNC6692 launched a massive email campaign in late December 2025, flooding targets with messages to create a sense of urgency and distraction, before following up with a convincing Microsoft Teams message that pushed a malicious link. The attackers then cleverly disguised their malware as…

    osintsights.com/unc6692-expose

    #SocialEngineering #Unc6692 #GoogleThreatIntelligenceGroup #MicrosoftTeams #AmazonS3

  17. Mach-O Man Malware: What CISOs Need to Know

    Lazarus Group is conducting an active campaign targeting businesses through ClickFix attacks, distributing a newly identified macOS malware kit called "Mach-O Man". The attack begins with fake meeting invitations via Telegram, redirecting victims to fraudulent collaboration platforms impersonating Zoom, Microsoft Teams, or Google Meet. Victims are tricked into executing terminal commands that install the malware. The kit consists of Go-based Mach-O binaries including a stager, profiler, persistence mechanism, and stealer. The malware collects credentials, browser data, and macOS Keychain entries, exfiltrating data through Telegram. Primary targets include fintech, crypto, and high-value environments where macOS is prevalent. The campaign leverages social engineering and native macOS binaries to evade traditional EDR detection, ultimately enabling account takeover, unauthorized infrastructure access, and financial loss.

    Pulse ID: 69e82714e5cf2d1fb9fe1b0a
    Pulse Link: otx.alienvault.com/pulse/69e82
    Pulse Author: AlienVault
    Created: 2026-04-22 01:40:36

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Browser #CyberSecurity #EDR #Google #GoogleMeet #InfoSec #Lazarus #Mac #MacOS #Malware #Microsoft #MicrosoftTeams #OTX #OpenThreatExchange #RAT #SocialEngineering #Telegram #Zoom #bot #AlienVault

  18. Iranian APT Seedworm Targets Global Organizations via Microsoft Teams

    Pulse ID: 69e6fb820c2c73386320bce2
    Pulse Link: otx.alienvault.com/pulse/69e6f
    Pulse Author: Tr1sa111
    Created: 2026-04-21 04:22:26

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Iran #Microsoft #MicrosoftTeams #OTX #OpenThreatExchange #SeedWorm #Worm #bot #Tr1sa111

  19. Microsoft Teams Targeted in Rising Helpdesk Impersonation Attacks

    Microsoft is sounding the alarm on a growing threat: hackers are exploiting Microsoft Teams' external collaboration features to impersonate helpdesk teams and gain access to enterprise networks. They're using the platform's own tools to move undetected, posing a major challenge for defenders.

    osintsights.com/microsoft-team

    #MicrosoftTeams #HelpdeskImpersonation #CollaborationTools #EnterpriseNetworks #LateralMovement

  20. Iranian APT Seedworm Targets Global Organizations via Microsoft Teams

    In late February 2026, following escalating Middle East tensions and coordinated military actions, Iranian APT group Seedworm launched sophisticated social engineering attacks via Microsoft Teams. Attackers impersonated IT support personnel using deceptive Microsoft 365 tenant domains to convince victims to execute malicious MSI installers. The campaign deployed a custom backdoor called Dindoor, which leveraged legitimate Deno runtime to execute obfuscated payloads in-memory, minimizing detection. The operation included multiple components for persistence, command-and-control communications, and data exfiltration. Infrastructure overlapped with previously reported MuddyWater operations. The attack demonstrates the group's evolution in using collaboration platforms as initial access vectors while combining dual-use tooling with living-off-the-land techniques to bypass traditional security controls.

    Pulse ID: 69e2417dcac9587a626c98a2
    Pulse Link: otx.alienvault.com/pulse/69e24
    Pulse Author: AlienVault
    Created: 2026-04-17 14:19:41

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #CyberSecurity #InfoSec #Iran #Microsoft #MicrosoftTeams #MiddleEast #Military #MuddyWater #Nim #OTX #OpenThreatExchange #RAT #SeedWorm #SocialEngineering #Worm #bot #AlienVault

  21. Edge Update Disrupts Microsoft Teams Paste Function

    A recent Microsoft Edge update has introduced a frustrating bug that breaks the right-click paste function in Microsoft Teams chats, causing inconvenience for users who rely on quick clipboard actions. This unexpected glitch is a major disruption for Teams users who depend on seamless communication.

    osintsights.com/edge-update-di

    #MicrosoftEdge #MicrosoftTeams #BrowserUpdate #ClipboardBug #DesktopClient

  22. I've never made use of "group" Signal calls but apparently there have been some improvements made to it.

    Another way to say goodbye to #Zoom #MicrosoftTeams etc.

    #Signal #videochat

    signal.org/blog/call-links/

  23. 👥 Google повідомила про запровадження сумісності #GoogleMeet з #MicrosoftTeams. Це дозволить приєднуватись до зустрічей у Microsoft Teams та навпаки.
    itc.ua/ua/novini/uchasnyky-goo

  24. Caída global de Microsoft 365, miles de usuarios sin acceso a Outlook y Teams

    Una falla masiva en los servicios de Microsoft ha dejado a empresas y usuarios particulares en todo el mundo sin acceso a herramientas críticas como el correo electrónico de Outlook y el almacenamiento en la nube de OneDrive. La compañía ha confirmado que se trata de un problema de conectividad que afecta a gran parte de su ecosistema de productividad, generando interrupciones en la jornada laboral a nivel global.

    https://twitter.com/MSFT365Status/status/2014432216852340823

    Desde las primeras horas de este jueves, los reportes de fallos en el servicio de Microsoft 365 comenzaron a inundar las redes sociales y portales de monitoreo como Downdetector. Los usuarios informan que no pueden enviar ni recibir correos electrónicos, y que las aplicaciones de escritorio y web de Teams no permiten la conexión a reuniones o el intercambio de archivos. Según los datos técnicos, el problema parece estar relacionado con un cambio en la configuración de la red de Microsoft que ha bloqueado el tráfico hacia sus centros de datos en diversas regiones.

    Microsoft, a través de sus canales oficiales de soporte, ha reconocido la situación y asegura que ya se encuentran trabajando en la solución. «Estamos investigando un problema que impide a los usuarios acceder a múltiples servicios de Microsoft 365. Hemos identificado la posible causa raíz y estamos en proceso de revertir una actualización de red reciente para restaurar el servicio», señaló la empresa en un breve comunicado. A pesar de los esfuerzos, la recuperación ha sido lenta y muchos departamentos de IT han tenido que activar protocolos de emergencia.

    Este apagón digital pone de relieve la enorme dependencia de la infraestructura corporativa global hacia los servicios en la nube de un solo proveedor. Sectores como la banca, la educación y la salud han reportado dificultades para operar con normalidad durante el tiempo que ha durado la caída. Se recomienda a los usuarios afectados evitar intentos repetidos de inicio de sesión, ya que esto podría saturar aún más los servidores mientras se restablece la normalidad de forma escalonada.

    #arielmcorg #CaídaDelServicio #infosertec #internet #it #microsoft #Microsoft365 #MicrosoftTeams #nube #Outlook #PORTADA #productividad #tecnología

  25. Z ciekawosci zainstalowalem sobie ten #wrapper na #MicrosoftTeams na #Linux.a... chcialbym, zeby ten szajs na #Windows.a dzialal tak szybko jak wersja Linuxowa xD
    Nawet brak mozliwosci zalogowania sie na dwa konta jednoczesnie tak nie boli, bo mozna sobie odpalic dwie osobne instancje aplikacji

  26. Z ciekawosci zainstalowalem sobie ten #wrapper na #MicrosoftTeams na #Linux.a... chcialbym, zeby ten szajs na #Windows.a dzialal tak szybko jak wersja Linuxowa xD
    Nawet brak mozliwosci zalogowania sie na dwa konta jednoczesnie tak nie boli, bo mozna sobie odpalic dwie osobne instancje aplikacji

  27. Z ciekawosci zainstalowalem sobie ten #wrapper na #MicrosoftTeams na #Linux.a... chcialbym, zeby ten szajs na #Windows.a dzialal tak szybko jak wersja Linuxowa xD
    Nawet brak mozliwosci zalogowania sie na dwa konta jednoczesnie tak nie boli, bo mozna sobie odpalic dwie osobne instancje aplikacji

  28. Z ciekawosci zainstalowalem sobie ten #wrapper na #MicrosoftTeams na #Linux.a... chcialbym, zeby ten szajs na #Windows.a dzialal tak szybko jak wersja Linuxowa xD
    Nawet brak mozliwosci zalogowania sie na dwa konta jednoczesnie tak nie boli, bo mozna sobie odpalic dwie osobne instancje aplikacji

  29. Z ciekawosci zainstalowalem sobie ten #wrapper na #MicrosoftTeams na #Linux.a... chcialbym, zeby ten szajs na #Windows.a dzialal tak szybko jak wersja Linuxowa xD
    Nawet brak mozliwosci zalogowania sie na dwa konta jednoczesnie tak nie boli, bo mozna sobie odpalic dwie osobne instancje aplikacji

  30. Via #LLRX @psuPete Recommends – Weekly highlights on #cybersecurity issues, December 28, 2025 – Five highlights from this week: #Google will finally allow you to change your @gmail.com address; Those #Epstein #Redactions Weren’t So Redacted; How #Russia could attack #ElonMusk #Starlink #satellites; #MicrosoftTeams to let admins block external users via Defender portal; and #NIST warns of Network Time Protocol inaccuracy after #blackouts across #Colorado. llrx.com/2025/12/pete-recommen #privacy

  31. Day 22 of #ITAdvent. In February 2026 #MicrosoftTeams will rollout Express Voice Enrollment and prompt users to opt-in. When the user choses to enroll the features enables improved voice isolation, speaker attribution in meetings rooms etc., this is probably something that organizations explain to their users. Especially when there are #privacy concerns on biometric data. See #Microsoft365 roadmap ID #537269 microsoft.com/nl-nl/microsoft-
    and the Learn article learn.microsoft.com/en-us/micr

  32. Day 21 of #ITAdvent. From February 2026, #MicrosoftTeams will remove #EXIF #metadata from shared photo's, which can include location data. This is a good move as #Purview #DLP (as far as I know) cannot use EXIF data in it's policies.
    Currently on the #Microsoft365 Roadmap #542795 under microsoft.com/en-us/microsoft-

  33. Day 13 of #ITAdvent. #Microsoft365 and #MicrosoftTeams admins will be able to customize the recording and transcript notification from January 2026. This is a long awaited feature by many organization. I whish I had this 5 years ago and didn't have to use Terms of Use Conditional Access policy to achieve something similar.

  34. Ich weiß, dass nicht überall in #schleswigholstein die #nextcloud das Allheilmittel für alles ist. Ich weiß, dass es Kommunen gibt, die ein Hybrid-Setup einführen, weil sie #MicrosoftTeams nutzen werden. Also zum #ExchangeServer, versteht sich. Und es wird weiterhin in nicht allen Kommunen #LibreOffice geben. All das weiß ich, aber macht ihr mal eure Diskussionen.