Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
9 résultats taggé Teams  ✕
MC1193689 - Microsoft baseline security mode for Office, SharePoint, Exchange, Teams, and Entra https://mc.merill.net/message/MC1193689
16/12/2025 21:33:23
QRCode
archive.org

Summary
Baseline Security Mode centralizes Microsoft’s recommended security standards for Office, SharePoint, Exchange, Teams, and Entra. Rolling out from November 2025 to March 2026, it provides admins with a dashboard to assess and improve security posture using impact reports and risk-based recommendations, with no immediate user impact.

More information
Introduction

Baseline Security Mode is a centralized experience that helps you meet Microsoft’s recommended security standards across Office, SharePoint, Exchange, Teams, and Entra. It leverages Microsoft’s threat intelligence and insights from two decades of Microsoft Response Center cases to strengthen your organization’s security posture and prepare for evolving AI-driven threats.
When this will happen:

Public Preview: Rollout begins mid-November 2025 and completes by late January 2026.
General Availability (Worldwide): Rollout begins mid-November 2025 and completes by late January 2026.
General Availability (GCC): Rollout begins early January 2026 and completes by late January 2026.
General Availability (DoD): Rollout begins early February 2026 and completes by late February 2026.
General Availability (GCCH): Rollout begins early March 2026 and completes by late March 2026.
How this affects your organization:

Who is affected: Global admins and security admins managing Microsoft 365 tenants across Office, SharePoint, Exchange, Teams, and Entra.
What will happen:

A new Baseline Security Mode dashboard will be available in the Microsoft 365 admin center.
Admins can view the tenant’s current security posture compared to Microsoft’s recommended minimum security bar.
Admins can run impact analysis reports to assess changes before applying them.
Recommendations will be grouped by risk level, with statuses such as “At risk” or “Meets standards.”
No immediate user impact unless admins apply changes.
What you can do to prepare:

Navigate to Microsoft 365 admin center > Settings > Org Settings > Security & privacy > Baseline Security Mode.
Review recommendations marked as “At risk.”
Initiate an impact report to understand potential changes.
Apply recommendations to bring your tenant to “Meets standards.”
Communicate upcoming changes to your helpdesk or security teams.

Learn more: Baseline security mode settings | Microsoft Learn

Compliance considerations:

No compliance considerations identified; review as appropriate for your organization.and risk-based recommendations, with no immediate user impact.

mc.merill.net EN Microsoft BaselineSecurityMode Office SharePoint Exchange Teams Entra
ReliaQuest Uncovers New Black Basta Social Engineering Technique - ReliaQuest https://www.reliaquest.com/blog/black-basta-social-engineering-technique-microsoft-teams/
30/10/2024 12:10:47
QRCode
archive.org
thumbnail

ReliaQuest has observed a new Black Basta social engineering campaign targeting users via Microsoft Teams and malicious QR codes.

reliaquest EN 2024 social-engineering BlackBasta Microsoft Teams QRCode analysis
DarkGate Opens Organizations for Attack via Skype, Teams https://www.trendmicro.com/en_us/research/23/j/darkgate-opens-organizations-for-attack-via-skype-teams.html
14/03/2024 11:31:55
QRCode
archive.org
thumbnail

From July to September, we observed the DarkGate campaign (detected by Trend Micro as TrojanSpy.AutoIt.DARKGATE.AA) abusing instant messaging platforms to deliver a VBA loader script to victims. This script downloaded and executed a second-stage payload consisting of a AutoIT scripting containing the DarkGate malware code. It’s unclear how the originating accounts of the instant messaging applications were compromised, however is hypothesized to be either through leaked credentials available through underground forums or the previous compromise of the parent organization.

trendmicro EN 2024 malware DarkGate Skype Teams
DarkGate malware delivered via Microsoft Teams - detection and response https://cybersecurity.att.com/blogs/security-essentials/darkgate-malware-delivered-via-microsoft-teams-detection-and-response
01/02/2024 09:05:20
QRCode
archive.org
thumbnail

While most end users are well-acquainted with the dangers of traditional phishing attacks, such as those delivered via email or other media, a large proportion are likely unaware that Microsoft Teams chats could be a phishing vector. Most Teams activity is intra-organizational, but Microsoft enables External Access by default, which allows members of one organization to add users outside the organization to their Teams chats. Perhaps predictably, this feature has provided malicious actors a new avenue by which to exploit untrained or unaware users.

cybersecurity.att.com EN 2024 Microsoft Teams phishing malware
Midnight Blizzard conducts targeted social engineering over Microsoft Teams https://www.microsoft.com/en-us/security/blog/2023/08/02/midnight-blizzard-conducts-targeted-social-engineering-over-microsoft-teams/
04/08/2023 09:45:26
QRCode
archive.org
thumbnail

Microsoft Threat Intelligence has identified highly targeted social engineering attacks using credential theft phishing lures sent as Microsoft Teams chats by the threat actor that Microsoft tracks as Midnight Blizzard (previously tracked as NOBELIUM).

microsoft EN 2023 research Social-engineering NOBELIUM MidnightBlizzard Teams
Russia-backed hackers used Microsoft Teams to breach government agencies | TechCrunch https://techcrunch.com/2023/08/03/russia-hackers-microsoft-teams-government/
03/08/2023 15:16:48
QRCode
archive.org
thumbnail

Russian state-sponsored hackers posed as technical support staff on Microsoft Teams to compromise dozens of global organizations, including government agencies.

techcrunch EN 2023 state-sponsored hackers technical-support Microsoft Teams APT29
Microsoft Teams vulnerability allows attackers to deliver malware to employees https://www.helpnetsecurity.com/2023/06/23/microsoft-teams-deliver-malware/
28/06/2023 09:33:31
QRCode
archive.org
thumbnail

Security researchers have found a bug that could allow attackers to deliver malware directly into employees' Microsoft Teams inbox.

helpnetsecurity EN 2023 Microsoft Teams bug malware
Slack’s and Teams’ Lax App Security Raises Alarms https://www.wired.com/story/slack-microsoft-teams-app-security/
27/09/2022 07:51:57
QRCode
archive.org
thumbnail

New research shows how third-party apps could be exploited to infiltrate these sensitive workplace tools.

wired EN 2022 Microsoft Teams Slack third-party app research
Undermining Microsoft Teams Security by Mining Tokens https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens
15/09/2022 17:40:33
QRCode
archive.org
thumbnail

In August 2022, the Vectra Protect team identified an attack path that enables malicious actors with file system access to steal credentials for any Microsoft Teams user who is signed in.

Vectra EN 2022 token teams Microsoft credentials steal
4996 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn