Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Confirms New Outlook Bug Blocking Excel Attachments

Posted on December 1, 2025December 2, 2025 By CWS

Microsoft has acknowledged a irritating new problem affecting customers of the “new Outlook” for Home windows, the place Excel attachments fail to open if their filenames include non-ASCII characters.

The technical glitch, tracked below the reference ID EX1189359, triggers a obscure error message advising customers to “Strive opening the file once more later,” leaving many confused about the reason for the blockage.​

The issue targets the trendy “new Outlook” shopper explicitly and doesn’t seem to affect the traditional model of the software program. In keeping with Microsoft’s service well being dashboard, the foundation trigger lies in an encoding error inside the request used to open the recordsdata.

When an Excel file hooked up to an e mail consists of non-standard characters comparable to accented letters, symbols, or non-English scripts, the appliance fails to course of the filename accurately, leading to a right away error.​

This problem has been ongoing since late November 2025, with preliminary experiences surfacing round November 23. Whereas the scope is proscribed to particular file naming conventions, the affect is critical for worldwide customers or organizations that continuously use non-ASCII characters in doc titles.​

Microsoft’s Response and Repair Standing

As of the most recent replace on December 1, 2025, Microsoft engineers have efficiently developed a repair to deal with the lacking encoding in file-handling requests.

Nevertheless, the answer shouldn’t be but accessible to all customers. The corporate is presently within the validation section, testing the deployment to make sure it resolves the error with out introducing secondary points.​

Microsoft can also be investigating why this encoding error occurred within the first place to forestall related regressions in future updates. An additional standing replace is anticipated by the night of December 1, UTC time.​

Till the patch is totally rolled out, Microsoft has offered two official workarounds for customers who want fast entry to their spreadsheets:

Use Outlook on the Internet (OWA): The net-based model of Outlook accurately processes these attachments, bypassing the client-side encoding failure.​

Obtain the File Regionally: Customers can save the attachment to their pc first. As soon as the file is saved to an area drive, it may be opened immediately in Excel with out triggering the Outlook previewer error.​

This incident joins a rising listing of pains for the brand new Outlook shopper, which has confronted scrutiny from energy customers for feature-parity gaps in comparison with the traditional COM-based software. Admin directors can monitor the progress of the repair within the Microsoft 365 admin heart below EX1189359.​

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attachments, Blocking, Bug, Confirms, Excel, Microsoft, Outlook

Post navigation

Previous Post: India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom Fraud
Next Post: TangleCrypt Windows Packer with Ransomware Payloads Evades EDR Using ABYSSWORKER Driver

Related Posts

New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards Cyber Security News
New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps Cyber Security News
K7 Antivirus Vulnerability Allows Attackers Gain SYSTEM-level Privileges Cyber Security News
Hackers Using ClickFix Technique to Attack Windows Machine and Execute Powershell Commands Cyber Security News
UAC-0099 Hackers Weaponizing HTA Files to Deliver MATCHBOIL Loader Malware Cyber Security News
Sendmarc Appoints Dan Levinson as Customer Success Director in North America Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark