Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Anti-Spam Bug Blocks Users From Opening URLs in Exchange Online and Teams

Posted on September 9, 2025September 9, 2025 By CWS

A widespread difficulty with Microsoft’s anti-spam filtering service is stopping some Alternate On-line and Microsoft Groups customers from opening URLs, disrupting workflows throughout organizations.

The issue, tracked below Microsoft advisory MO1148487, stays ongoing as the corporate works on a everlasting repair.

In response to Microsoft, the problem stems from an anti-spam detection mechanism that’s mistakenly flagging sure URLs as malicious.

Particularly, URLs nested inside different URLs have been incorrectly recognized as threats. In consequence, impacted customers are unable to open hyperlinks shared in Alternate On-line emails or Microsoft Groups chats.

Along with blocking hyperlink entry, directors have reported false alerts titled “A doubtlessly malicious URL click on was detected involving one person.”

Microsoft has confirmed that the URLs being flagged are secure and emphasised that the warnings are misguided. Some e mail messages have additionally been quarantined unnecessarily, including to the disruption for companies counting on Alternate and Groups for communication.

The issue has led to confusion in organizations the place safety alerts sometimes set off incident response processes. Whereas the impression is widespread, Microsoft has assured customers that almost all of points have already been mitigated. Nevertheless, residual link-access issues stay for some customers as the corporate continues to fine-tune its anti-spam service.

Microsoft’s Response and Subsequent Steps

In its newest replace on September 9, 2025, at 08:25 AM UTC, Microsoft introduced that it had recognized a brand new subset of affected URLs and is actively addressing them alongside any leftover impacts from the preliminary difficulty. Engineers are additionally performing a root trigger evaluation to forestall recurrence.

Microsoft said: “We’re assured {that a} majority of the impression has been resolved, and we’re actively addressing lingering points. Our groups are persevering with to look at the anti-spam detection techniques that incorrectly flagged these URLs.”

The corporate has set the following official progress replace for six:00 PM UTC on September 9, 2025. Till then, prospects might expertise intermittent points opening hyperlinks in affected messages.

Microsoft has suggested admins and customers to observe the Service Well being Dashboard for updates. Whereas the corporate continues to remediate, organizations are urged to not deal with the present alerts as real threats, because the flagged URLs have been confirmed to be secure.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:AntiSpam, Blocks, Bug, Exchange, Microsoft, Online, Opening, Teams, URLs, Users

Post navigation

Previous Post: New RatOn Takes Control Over Bank Account and Initiates Automated Money Transfers
Next Post: Police Body Camera Apps Sending Data to Cloud Servers Hosted in China Via TLS Port 9091

Related Posts

CISA Warns of Rails Ruby on Rails Path Traversal Vulnerability Exploited in Attacks Cyber Security News
Insecure GitHub Actions in Open Source Projects MITRE and Splunk Exposes Critical Vulnerabilities Cyber Security News
Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication and Upload Malicious Files Cyber Security News
UNC3886 Hackers Exploiting 0-Days in VMware vCenter/ESXi, Fortinet FortiOS, and Juniper Junos OS Cyber Security News
Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments Cyber Security News
A Free Zero Trust Web Application Firewall for 2026 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
  • Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control
  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
  • Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control
  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News