Toot

Written by Brian Clark on 2025-01-21 at 19:57

This tactic of sending unsolicited messages and calls via Teams has an easy solution—only allow specific external domains to communicate with your end users. Review your Teams logs, see which domains your users are communicating with, add them to the allow list and enable the control. Make your end users open up a support ticket for future domain adds so you can vet them.

[#]Cybersecurity

This is unfortunately another example of #Microsoft INsecure by default, as they allow messages and calls from any domain by default and leave it up to the organization to manage.

Microsoft docs:

https://learn.microsoft.com/en-us/microsoft-365/solutions/trusted-vendor-onboarding?view=o365-worldwide#allow-the-vendors-domain-in-teams-external-access

From: @BleepingComputer

https://infosec.exchange/@BleepingComputer/113867174217080151

=> More informations about this toot | View the thread | More toots from deepthoughts10@infosec.exchange

Mentions

=> View BleepingComputer@infosec.exchange profile

Tags

=> View cybersecurity tag | View microsoft tag

Proxy Information
Original URL
gemini://mastogem.picasoft.net/toot/113868107720915517
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
228.085268 milliseconds
Gemini-to-HTML Time
0.586633 milliseconds

This content has been proxied by September (3851b).