#microsoftteams — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #microsoftteams, aggregated by home.social.
-
Erst Signal, jetzt Teams.
"Cybercriminals have increasingly adopted Microsoft Teams in attacks, reaching out to company employees and pretending to be IT and help-desk staff.
The victims are convinced to run a malicious PowerShell command on their systems, which deploys the “ModeloRAT” malware." -
https://www.europesays.com/be-nl/61008/ Jabra lanceert PanaCast U30-videobar voor kleine vergaderzalen #BE #België #Belgium #HybrideWerken #Jabra #JabraPlus #MicrosoftTeams #PanaCastU30 #Science #ScienceAndTechnology #ScienceAndTechnology #Technologie #Technology #USBC #videobar #videoconferentie #Wetenschap #WetenschapEnTechnologie #WetenschapTechnologie
-
Jabra PanaCast U30 Video Bar Simplifies Video Meetings In Small Rooms
The new Jabra Panacast U30 is a video and soundbar for holding hybrid meetings in smaller meeting rooms…
#NewsBeep #News #Technology #AU #Australia #BYOD #Huddlespaces #meetingrooms #Microsoft #MicrosoftTeams #USB #Videobar #zoom
https://www.newsbeep.com/au/665992/ -
Jabra PanaCast U30 Video Bar Simplifies Video Meetings In Small Rooms
The new Jabra Panacast U30 is a video and soundbar for holding hybrid meetings in smaller meeting rooms…
#NewsBeep #News #Technology #AU #Australia #BYOD #Huddlespaces #meetingrooms #Microsoft #MicrosoftTeams #USB #Videobar #zoom
https://www.newsbeep.com/au/665992/ -
Mein #arbeitgeber labert grade in so nem #MicrosoftTeams Call für alle Mitarbeiter was von #digitalesouveranitat und dann soll ich MEHR mit #microsoft #github #copilot machen. Und selbstverständlich wird ALLES #ai. Sogar unsere TLD wechselt von .net auf .ai.
Wir sollen ganz explizit doch bitte #ki in die tägliche #Arbeit einbinden, der Vertrieb soll sich beim. Aber bloß "unsere" nutzen, wegen den Daten. Muss mich gleich mal informieren, ob #localLLMs erlaubt sind.
https://hessen.social/@Moonstone2487/116082676681677166 -
MuddyWater usa il ransomware Chaos come falsa bandiera: l’Iran maschera lo spionaggio di Stato da cybercrime
Il gruppo APT iraniano MuddyWater ha condotto un'operazione di cyberspionaggio mascherandola da attacco ransomware Chaos. Rapid7 rivela come Microsoft Teams sia stato usato per rubare credenziali e bypassare l'MFA, con il vero obiettivo di esfiltrazione dati e persistenza a lungo termine: non l'estorsione finanziaria. -
What if we told Nextcloud Talk can do what #MicrosoftTeams does AND so much more? �
Join our webinar to see how #NextcloudTalk compares to Microsoft Teams:
✔ More secure
✔ Feature-rich
✔ Full data control📅 May 21, 2 PM CEST
Save your spot 👇
https://go.nextcloud.com/r/B8y0 -
Lorem Ipsum Malware: Trojanized MS Teams Installers
An emerging threat group is conducting a global SEO-poisoning campaign distributing trojanized Microsoft Teams installers that deploy a multi-stage shellcode loader and backdoor designated Lorem Ipsum. Active since February 2026, the campaign targets users searching for Microsoft Teams across six countries, with confirmed targeting of a US healthcare organization. The operators evolved rapidly from minimally obfuscated test builds to sophisticated loaders featuring substitution cipher decoding, XOR-encrypted shellcode, DLL sideloading, and JFIF-disguised C2 traffic. The malware distinctively abuses letsdiskuss[.]com, a legitimate India-based platform, as a dead-drop resolver for C2 infrastructure. Attackers use validly signed MSI installers with three-day Microsoft ID Verified certificates, NameCheap-registered infrastructure weaponized within hours, and per-victim UUID-tracked callbacks. Development velocity suggests possible LLM-assisted tooling, indicating a well-funded mid-tier criminal actor operating...
Pulse ID: 69f92fedbdf318f94db2fc63
Pulse Link: https://otx.alienvault.com/pulse/69f92fedbdf318f94db2fc63
Pulse Author: AlienVault
Created: 2026-05-04 23:46:53Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #Healthcare #India #InfoSec #Malware #Microsoft #MicrosoftTeams #Namecheap #Nim #OTX #OpenThreatExchange #RAT #ShellCode #SideLoading #Trojan #bot #AlienVault
-
Lorem Ipsum Malware: Trojanized MS Teams Installers
An emerging threat group is conducting a global SEO-poisoning campaign distributing trojanized Microsoft Teams installers that deploy a multi-stage shellcode loader and backdoor designated Lorem Ipsum. Active since February 2026, the campaign targets users searching for Microsoft Teams across six countries, with confirmed targeting of a US healthcare organization. The operators evolved rapidly from minimally obfuscated test builds to sophisticated loaders featuring substitution cipher decoding, XOR-encrypted shellcode, DLL sideloading, and JFIF-disguised C2 traffic. The malware distinctively abuses letsdiskuss[.]com, a legitimate India-based platform, as a dead-drop resolver for C2 infrastructure. Attackers use validly signed MSI installers with three-day Microsoft ID Verified certificates, NameCheap-registered infrastructure weaponized within hours, and per-victim UUID-tracked callbacks. Development velocity suggests possible LLM-assisted tooling, indicating a well-funded mid-tier criminal actor operating...
Pulse ID: 69f92fedbdf318f94db2fc63
Pulse Link: https://otx.alienvault.com/pulse/69f92fedbdf318f94db2fc63
Pulse Author: AlienVault
Created: 2026-05-04 23:46:53Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #Healthcare #India #InfoSec #Malware #Microsoft #MicrosoftTeams #Namecheap #Nim #OTX #OpenThreatExchange #RAT #ShellCode #SideLoading #Trojan #bot #AlienVault
-
Lorem Ipsum Malware: Trojanized MS Teams Installers
An emerging threat group is conducting a global SEO-poisoning campaign distributing trojanized Microsoft Teams installers that deploy a multi-stage shellcode loader and backdoor designated Lorem Ipsum. Active since February 2026, the campaign targets users searching for Microsoft Teams across six countries, with confirmed targeting of a US healthcare organization. The operators evolved rapidly from minimally obfuscated test builds to sophisticated loaders featuring substitution cipher decoding, XOR-encrypted shellcode, DLL sideloading, and JFIF-disguised C2 traffic. The malware distinctively abuses letsdiskuss[.]com, a legitimate India-based platform, as a dead-drop resolver for C2 infrastructure. Attackers use validly signed MSI installers with three-day Microsoft ID Verified certificates, NameCheap-registered infrastructure weaponized within hours, and per-victim UUID-tracked callbacks. Development velocity suggests possible LLM-assisted tooling, indicating a well-funded mid-tier criminal actor operating...
Pulse ID: 69f92fedbdf318f94db2fc63
Pulse Link: https://otx.alienvault.com/pulse/69f92fedbdf318f94db2fc63
Pulse Author: AlienVault
Created: 2026-05-04 23:46:53Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #Healthcare #India #InfoSec #Malware #Microsoft #MicrosoftTeams #Namecheap #Nim #OTX #OpenThreatExchange #RAT #ShellCode #SideLoading #Trojan #bot #AlienVault
-
Lorem Ipsum Malware: Trojanized MS Teams Installers
An emerging threat group is conducting a global SEO-poisoning campaign distributing trojanized Microsoft Teams installers that deploy a multi-stage shellcode loader and backdoor designated Lorem Ipsum. Active since February 2026, the campaign targets users searching for Microsoft Teams across six countries, with confirmed targeting of a US healthcare organization. The operators evolved rapidly from minimally obfuscated test builds to sophisticated loaders featuring substitution cipher decoding, XOR-encrypted shellcode, DLL sideloading, and JFIF-disguised C2 traffic. The malware distinctively abuses letsdiskuss[.]com, a legitimate India-based platform, as a dead-drop resolver for C2 infrastructure. Attackers use validly signed MSI installers with three-day Microsoft ID Verified certificates, NameCheap-registered infrastructure weaponized within hours, and per-victim UUID-tracked callbacks. Development velocity suggests possible LLM-assisted tooling, indicating a well-funded mid-tier criminal actor operating...
Pulse ID: 69f92fedbdf318f94db2fc63
Pulse Link: https://otx.alienvault.com/pulse/69f92fedbdf318f94db2fc63
Pulse Author: AlienVault
Created: 2026-05-04 23:46:53Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #Healthcare #India #InfoSec #Malware #Microsoft #MicrosoftTeams #Namecheap #Nim #OTX #OpenThreatExchange #RAT #ShellCode #SideLoading #Trojan #bot #AlienVault
-
Lorem Ipsum Malware: Trojanized MS Teams Installers
An emerging threat group is conducting a global SEO-poisoning campaign distributing trojanized Microsoft Teams installers that deploy a multi-stage shellcode loader and backdoor designated Lorem Ipsum. Active since February 2026, the campaign targets users searching for Microsoft Teams across six countries, with confirmed targeting of a US healthcare organization. The operators evolved rapidly from minimally obfuscated test builds to sophisticated loaders featuring substitution cipher decoding, XOR-encrypted shellcode, DLL sideloading, and JFIF-disguised C2 traffic. The malware distinctively abuses letsdiskuss[.]com, a legitimate India-based platform, as a dead-drop resolver for C2 infrastructure. Attackers use validly signed MSI installers with three-day Microsoft ID Verified certificates, NameCheap-registered infrastructure weaponized within hours, and per-victim UUID-tracked callbacks. Development velocity suggests possible LLM-assisted tooling, indicating a well-funded mid-tier criminal actor operating...
Pulse ID: 69f92fedbdf318f94db2fc63
Pulse Link: https://otx.alienvault.com/pulse/69f92fedbdf318f94db2fc63
Pulse Author: AlienVault
Created: 2026-05-04 23:46:53Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #Healthcare #India #InfoSec #Malware #Microsoft #MicrosoftTeams #Namecheap #Nim #OTX #OpenThreatExchange #RAT #ShellCode #SideLoading #Trojan #bot #AlienVault
-
iX-Workshop: Microsoft Teams sicher und effizient administrieren
Lernen Sie, wie Sie mit Microsoft Teams eine sichere und effiziente Arbeitsumgebung einrichten, verwalten und an die Bedürfnisse des Unternehmens anpassen.
-
https://winbuzzer.com/2026/04/30/20260430-microsoft-blames-slacks-lackluster-growth-on-infer-xcxwbn/
UK Court Weighs Microsoft Teams Bundling Against Slack
#MicrosoftTeams #Microsoft #Slack #Salesforce #Antitrust #Lawsuits #EnterpriseSoftware #Microsoft365 #EuropeanCommissionEC #EuropeanUnionEU #UnitedKingdomUK #Licensing #Court
-
Hello everyone—how’s it going?
Quick question for my Windows crew, especially folks using NVDA: what email client are you using these days? I’m looking for something that plays nicely with Microsoft Teams and Zoom.
Also curious… how’s the new Outlook holding up in 2026? Has accessibility improved, or is it still hit or miss?
Would love to hear what’s working well for you.
#Windows #NVDA #ScreenReader #Accessibility #BlindTech #AssistiveTechnology #Outlook #EmailClients #MicrosoftTeams #Zoom
-
《[...] Funktion zum jetzigen Zeitpunkt erst in Entwicklung [...]》
— gefühlt eine Funktion, die schon vor 20 Jahren nützlich gewesen wäre#MicrosoftTeams bekommt Mikrofontest vor Meeting-Beitritt | heise online https://www.heise.de/news/Test-Test-1-2-3-Microsoft-Teams-bekommt-Mikrofontest-11270745.html #Microsoft #VideoConferencing
-
Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite
Google Threat Intelligence Group identified a sophisticated intrusion campaign by UNC6692 that combined persistent social engineering with custom malware. The attackers impersonated IT helpdesk personnel via Microsoft Teams, leveraging initial email spam campaigns to create urgency. Victims were tricked into downloading AutoHotKey scripts that installed SNOWBELT, a malicious browser extension establishing persistence through scheduled tasks. The modular SNOW ecosystem enabled deep network penetration: SNOWBELT provided initial access, SNOWGLAZE created encrypted WebSocket tunnels masking traffic as legitimate cloud communications, and SNOWBASIN functioned as a local backdoor for command execution. UNC6692 performed internal reconnaissance, escalated privileges by extracting LSASS memory, and used Pass-The-Hash techniques to access domain controllers. The operation culminated in exfiltration of Active Directory databases and credentials via LimeWire, demonstrating advanced tradecraft abusing legitimate clou...
Pulse ID: 69ea72434c655fab0cee36d8
Pulse Link: https://otx.alienvault.com/pulse/69ea72434c655fab0cee36d8
Pulse Author: AlienVault
Created: 2026-04-23 19:25:55Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #Browser #Cloud #CyberSecurity #DomainController #Email #Google #InfoSec #Malware #Microsoft #MicrosoftTeams #OTX #OpenThreatExchange #RAT #SocialEngineering #Spam #Troll #bot #AlienVault
-
Test, Test, 1, 2, 3: Microsoft Teams gets microphone test
Microsoft wants to help plagued Teams users and will soon add a microphone test that can be run before joining a meeting.
#IT #Microsoft #Mikrofon #MicrosoftTeams #Test #Updates #news
-
Test, Test, 1, 2, 3: Microsoft Teams bekommt Mikrofontest
Microsoft will geplagten Teams-Nutzern helfen und ergänzt in Kürze einen Mikrofontest, der vor einem Meeting-Beitritt ausführbar ist.
#IT #Microsoft #Mikrofon #MicrosoftTeams #Test #Updates #news
-
UNC6692 Exposes Custom Malware Suite via Social Engineering
In a clever social engineering ploy, UNC6692 launched a massive email campaign in late December 2025, flooding targets with messages to create a sense of urgency and distraction, before following up with a convincing Microsoft Teams message that pushed a malicious link. The attackers then cleverly disguised their malware as…
#SocialEngineering #Unc6692 #GoogleThreatIntelligenceGroup #MicrosoftTeams #AmazonS3
-
Mach-O Man Malware: What CISOs Need to Know
Lazarus Group is conducting an active campaign targeting businesses through ClickFix attacks, distributing a newly identified macOS malware kit called "Mach-O Man". The attack begins with fake meeting invitations via Telegram, redirecting victims to fraudulent collaboration platforms impersonating Zoom, Microsoft Teams, or Google Meet. Victims are tricked into executing terminal commands that install the malware. The kit consists of Go-based Mach-O binaries including a stager, profiler, persistence mechanism, and stealer. The malware collects credentials, browser data, and macOS Keychain entries, exfiltrating data through Telegram. Primary targets include fintech, crypto, and high-value environments where macOS is prevalent. The campaign leverages social engineering and native macOS binaries to evade traditional EDR detection, ultimately enabling account takeover, unauthorized infrastructure access, and financial loss.
Pulse ID: 69e82714e5cf2d1fb9fe1b0a
Pulse Link: https://otx.alienvault.com/pulse/69e82714e5cf2d1fb9fe1b0a
Pulse Author: AlienVault
Created: 2026-04-22 01:40:36Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Browser #CyberSecurity #EDR #Google #GoogleMeet #InfoSec #Lazarus #Mac #MacOS #Malware #Microsoft #MicrosoftTeams #OTX #OpenThreatExchange #RAT #SocialEngineering #Telegram #Zoom #bot #AlienVault
-
Iranian APT Seedworm Targets Global Organizations via Microsoft Teams
Pulse ID: 69e6fb820c2c73386320bce2
Pulse Link: https://otx.alienvault.com/pulse/69e6fb820c2c73386320bce2
Pulse Author: Tr1sa111
Created: 2026-04-21 04:22:26Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #InfoSec #Iran #Microsoft #MicrosoftTeams #OTX #OpenThreatExchange #SeedWorm #Worm #bot #Tr1sa111
-
Microsoft Teams Targeted in Rising Helpdesk Impersonation Attacks
Microsoft is sounding the alarm on a growing threat: hackers are exploiting Microsoft Teams' external collaboration features to impersonate helpdesk teams and gain access to enterprise networks. They're using the platform's own tools to move undetected, posing a major challenge for defenders.
#MicrosoftTeams #HelpdeskImpersonation #CollaborationTools #EnterpriseNetworks #LateralMovement
-
Iranian APT Seedworm Targets Global Organizations via Microsoft Teams
In late February 2026, following escalating Middle East tensions and coordinated military actions, Iranian APT group Seedworm launched sophisticated social engineering attacks via Microsoft Teams. Attackers impersonated IT support personnel using deceptive Microsoft 365 tenant domains to convince victims to execute malicious MSI installers. The campaign deployed a custom backdoor called Dindoor, which leveraged legitimate Deno runtime to execute obfuscated payloads in-memory, minimizing detection. The operation included multiple components for persistence, command-and-control communications, and data exfiltration. Infrastructure overlapped with previously reported MuddyWater operations. The attack demonstrates the group's evolution in using collaboration platforms as initial access vectors while combining dual-use tooling with living-off-the-land techniques to bypass traditional security controls.
Pulse ID: 69e2417dcac9587a626c98a2
Pulse Link: https://otx.alienvault.com/pulse/69e2417dcac9587a626c98a2
Pulse Author: AlienVault
Created: 2026-04-17 14:19:41Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #InfoSec #Iran #Microsoft #MicrosoftTeams #MiddleEast #Military #MuddyWater #Nim #OTX #OpenThreatExchange #RAT #SeedWorm #SocialEngineering #Worm #bot #AlienVault
-
Montag: Eröffnung der Hannover Messe 2026, Raumsonde Voyager 1 im Stromsparmodus
Partnerland Brasilien für Erneuerbare + Stromsparpläne für Sonden + Microsoft Teams mit Paste-Problem + Amazon gegen Sideloading + Piraten-Rollenspiel Windrose
#AmazonFireTV #ErneuerbareEnergie #HannoverMesse #hoDaily #Journal #MicrosoftTeams #NASA #Raumfahrt #Spiele #Streaming #news
-
Edge Update Disrupts Microsoft Teams Paste Function
A recent Microsoft Edge update has introduced a frustrating bug that breaks the right-click paste function in Microsoft Teams chats, causing inconvenience for users who rely on quick clipboard actions. This unexpected glitch is a major disruption for Teams users who depend on seamless communication.
#MicrosoftEdge #MicrosoftTeams #BrowserUpdate #ClipboardBug #DesktopClient
-
📬 DeepL Voice: Echtzeit-Übersetzung – Durchbruch oder KI-Hype?
#KünstlicheIntelligenz #DeepL #DeepLVoice #EchtzeitÜbersetzung #KISprachübersetzung #LiveÜbersetzung #MicrosoftTeams #Sprachübersetzung #VoicetoVoice #Zoom https://sc.tarnkappe.info/9141fc -
Microsoft Ships Emergency Windows 11 Fix for Broken Patch
#Windows11 #Microsoft #WindowsUpdate #WindowsUpdates #Cybersecurity #Software #BigTech #WindowsServer #MicrosoftTeams #OneDrive #MicrosoftEdge #Microsoft365Copilot #Windows1 #CumulativeUpdate
-
https://winbuzzer.com/2026/03/22/microsoft-march-windows-update-breaks-account-sign-ins-xcxwbn/
March Windows Update Breaks Microsoft Account Sign-ins
#Windows11 #Microsoft #WindowsUpdate #MicrosoftTeams #MicrosoftEdge #OneDrive #Microsoft365 #MicrosoftAccount #Authentication #SecurityPatches #SoftwareUpdates #Windows1124H2 #BigTech #MicrosoftEntraID
-
https://winbuzzer.com/2026/03/22/microsoft-march-windows-update-breaks-account-sign-ins-xcxwbn/
March Windows Update Breaks Microsoft Account Sign-ins
#Windows11 #Microsoft #WindowsUpdate #MicrosoftTeams #MicrosoftEdge #OneDrive #Microsoft365 #MicrosoftAccount #Authentication #SecurityPatches #SoftwareUpdates #Windows1124H2 #BigTech #MicrosoftEntraID
-
https://winbuzzer.com/2026/03/22/microsoft-march-windows-update-breaks-account-sign-ins-xcxwbn/
March Windows Update Breaks Microsoft Account Sign-ins
#Windows11 #Microsoft #WindowsUpdate #MicrosoftTeams #MicrosoftEdge #OneDrive #Microsoft365 #MicrosoftAccount #Authentication #SecurityPatches #SoftwareUpdates #Windows1124H2 #BigTech #MicrosoftEntraID
-
https://winbuzzer.com/2026/03/22/microsoft-march-windows-update-breaks-account-sign-ins-xcxwbn/
March Windows Update Breaks Microsoft Account Sign-ins
#Windows11 #Microsoft #WindowsUpdate #MicrosoftTeams #MicrosoftEdge #OneDrive #Microsoft365 #MicrosoftAccount #Authentication #SecurityPatches #SoftwareUpdates #Windows1124H2 #BigTech #MicrosoftEntraID
-
https://winbuzzer.com/2026/03/22/microsoft-march-windows-update-breaks-account-sign-ins-xcxwbn/
March Windows Update Breaks Microsoft Account Sign-ins
#Windows11 #Microsoft #WindowsUpdate #MicrosoftTeams #MicrosoftEdge #OneDrive #Microsoft365 #MicrosoftAccount #Authentication #SecurityPatches #SoftwareUpdates #Windows1124H2 #BigTech #MicrosoftEntraID
-
I've never made use of "group" Signal calls but apparently there have been some improvements made to it.
Another way to say goodbye to #Zoom #MicrosoftTeams etc.
-
👥 Google повідомила про запровадження сумісності #GoogleMeet з #MicrosoftTeams. Це дозволить приєднуватись до зустрічей у Microsoft Teams та навпаки.
https://itc.ua/ua/novini/uchasnyky-google-meet-teper-mozhut-zajty-na-videokonferentsiyi-microsoft-teams/ -
https://winbuzzer.com/2026/01/28/france-replaces-microsoft-teams-zoom-sovereign-visio-xcxwbn/
France Replaces Microsoft Teams & Zoom with Sovereign Platform
#France #MicrosoftTeams #Zoom #Microsoft #GoogleMeet #Cisco #Visio #CloudServices #CloudComputing #Europe #EU #DataPrivacy
-
France replaces MS Teams and Zoom with its own video conferencing software
With Visio, France is introducing its open-source video conferencing for authorities. By 2027, 200,000 civil servants are to work independently of US providers.
#DataAct #DigitaleSouveränität #EU #IT #MicrosoftTeams #Netzpolitik #OpenSource #Wirtschaft #news
-
Frankreich ersetzt MS Teams und Zoom durch eigene Videokonferenzsoftware
Mit Visio führt Frankreich seine Open-Source-Videokonferenzen für Behörden ein. Bis 2027 sollen 200.000 Beamte unabhängig von US-Anbietern arbeiten können.
#DataAct #DigitaleSouveränität #EU #IT #MicrosoftTeams #Netzpolitik #OpenSource #Wirtschaft #news
-
Caída global de Microsoft 365, miles de usuarios sin acceso a Outlook y Teams
Una falla masiva en los servicios de Microsoft ha dejado a empresas y usuarios particulares en todo el mundo sin acceso a herramientas críticas como el correo electrónico de Outlook y el almacenamiento en la nube de OneDrive. La compañía ha confirmado que se trata de un problema de conectividad que afecta a gran parte de su ecosistema de productividad, generando interrupciones en la jornada laboral a nivel global.
https://twitter.com/MSFT365Status/status/2014432216852340823
Desde las primeras horas de este jueves, los reportes de fallos en el servicio de Microsoft 365 comenzaron a inundar las redes sociales y portales de monitoreo como Downdetector. Los usuarios informan que no pueden enviar ni recibir correos electrónicos, y que las aplicaciones de escritorio y web de Teams no permiten la conexión a reuniones o el intercambio de archivos. Según los datos técnicos, el problema parece estar relacionado con un cambio en la configuración de la red de Microsoft que ha bloqueado el tráfico hacia sus centros de datos en diversas regiones.
Microsoft, a través de sus canales oficiales de soporte, ha reconocido la situación y asegura que ya se encuentran trabajando en la solución. «Estamos investigando un problema que impide a los usuarios acceder a múltiples servicios de Microsoft 365. Hemos identificado la posible causa raíz y estamos en proceso de revertir una actualización de red reciente para restaurar el servicio», señaló la empresa en un breve comunicado. A pesar de los esfuerzos, la recuperación ha sido lenta y muchos departamentos de IT han tenido que activar protocolos de emergencia.
Este apagón digital pone de relieve la enorme dependencia de la infraestructura corporativa global hacia los servicios en la nube de un solo proveedor. Sectores como la banca, la educación y la salud han reportado dificultades para operar con normalidad durante el tiempo que ha durado la caída. Se recomienda a los usuarios afectados evitar intentos repetidos de inicio de sesión, ya que esto podría saturar aún más los servidores mientras se restablece la normalidad de forma escalonada.
#arielmcorg #CaídaDelServicio #infosertec #internet #it #microsoft #Microsoft365 #MicrosoftTeams #nube #Outlook #PORTADA #productividad #tecnología
-
Z ciekawosci zainstalowalem sobie ten #wrapper na #MicrosoftTeams na #Linux.a... chcialbym, zeby ten szajs na #Windows.a dzialal tak szybko jak wersja Linuxowa xD
Nawet brak mozliwosci zalogowania sie na dwa konta jednoczesnie tak nie boli, bo mozna sobie odpalic dwie osobne instancje aplikacji -
Z ciekawosci zainstalowalem sobie ten #wrapper na #MicrosoftTeams na #Linux.a... chcialbym, zeby ten szajs na #Windows.a dzialal tak szybko jak wersja Linuxowa xD
Nawet brak mozliwosci zalogowania sie na dwa konta jednoczesnie tak nie boli, bo mozna sobie odpalic dwie osobne instancje aplikacji -
Z ciekawosci zainstalowalem sobie ten #wrapper na #MicrosoftTeams na #Linux.a... chcialbym, zeby ten szajs na #Windows.a dzialal tak szybko jak wersja Linuxowa xD
Nawet brak mozliwosci zalogowania sie na dwa konta jednoczesnie tak nie boli, bo mozna sobie odpalic dwie osobne instancje aplikacji -
Z ciekawosci zainstalowalem sobie ten #wrapper na #MicrosoftTeams na #Linux.a... chcialbym, zeby ten szajs na #Windows.a dzialal tak szybko jak wersja Linuxowa xD
Nawet brak mozliwosci zalogowania sie na dwa konta jednoczesnie tak nie boli, bo mozna sobie odpalic dwie osobne instancje aplikacji -
Z ciekawosci zainstalowalem sobie ten #wrapper na #MicrosoftTeams na #Linux.a... chcialbym, zeby ten szajs na #Windows.a dzialal tak szybko jak wersja Linuxowa xD
Nawet brak mozliwosci zalogowania sie na dwa konta jednoczesnie tak nie boli, bo mozna sobie odpalic dwie osobne instancje aplikacji -
Via #LLRX @psuPete Recommends – Weekly highlights on #cybersecurity issues, December 28, 2025 – Five highlights from this week: #Google will finally allow you to change your @gmail.com address; Those #Epstein #Redactions Weren’t So Redacted; How #Russia could attack #ElonMusk #Starlink #satellites; #MicrosoftTeams to let admins block external users via Defender portal; and #NIST warns of Network Time Protocol inaccuracy after #blackouts across #Colorado. https://www.llrx.com/2025/12/pete-recommends-weekly-highlights-on-cyber-security-issues-december-28-2025/ #privacy
-
Day 22 of #ITAdvent. In February 2026 #MicrosoftTeams will rollout Express Voice Enrollment and prompt users to opt-in. When the user choses to enroll the features enables improved voice isolation, speaker attribution in meetings rooms etc., this is probably something that organizations explain to their users. Especially when there are #privacy concerns on biometric data. See #Microsoft365 roadmap ID #537269 https://www.microsoft.com/nl-nl/microsoft-365/roadmap?filters=&searchterms=537269
and the Learn article https://learn.microsoft.com/en-us/microsoftteams/rooms/voice-and-face-recognition?wt.mc_id=M365-MVP-5000976 -
Day 21 of #ITAdvent. From February 2026, #MicrosoftTeams will remove #EXIF #metadata from shared photo's, which can include location data. This is a good move as #Purview #DLP (as far as I know) cannot use EXIF data in it's policies.
Currently on the #Microsoft365 Roadmap #542795 under https://www.microsoft.com/en-us/microsoft-365/roadmap?&searchterms=542795 -
Day 13 of #ITAdvent. #Microsoft365 and #MicrosoftTeams admins will be able to customize the recording and transcript notification from January 2026. This is a long awaited feature by many organization. I whish I had this 5 years ago and didn't have to use Terms of Use Conditional Access policy to achieve something similar.
-
Fake Microsoft Teams and Google Meet Downloads Spread Oyster Backdoor https://hackread.com/fake-microsoft-teams-google-meet-download-oyster-backdoor/ #MicrosoftTeams #CleanUpLoader #Cybersecurity #Malvertising #SEOPoisoning #CyberAttack #Broomstick #CyberProof #GoogleMeet #Security #backdoor #security #Malware #Oyster #WinSCP #PuTTY
-
Ich weiß, dass nicht überall in #schleswigholstein die #nextcloud das Allheilmittel für alles ist. Ich weiß, dass es Kommunen gibt, die ein Hybrid-Setup einführen, weil sie #MicrosoftTeams nutzen werden. Also zum #ExchangeServer, versteht sich. Und es wird weiterhin in nicht allen Kommunen #LibreOffice geben. All das weiß ich, aber macht ihr mal eure Diskussionen.