Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Teams Introduces Automatic Alerts for Malicious Links from Attackers

Posted on September 12, 2025September 12, 2025 By CWS

Microsoft to reinforce safety for its Groups platform by robotically warning customers about malicious hyperlinks in chat messages.

The brand new function, a part of Microsoft Defender for Workplace 365, is designed to guard customers from phishing, spam, and malware assaults by flagging probably dangerous URLs shared in each inside and exterior conversations.

The replace will start rolling out in a public preview for enterprise clients in early September 2025, with worldwide basic availability anticipated to be full by mid-November 2025.

The function will probably be accessible for Microsoft Groups on desktop, internet, Android, and iOS platforms.

Enhanced Safety Towards Malicious Hyperlinks

To fight the rising menace of phishing assaults inside collaboration instruments, Microsoft Groups will show a warning banner on any message containing a URL that its menace intelligence methods determine as malicious.

The system scans hyperlinks in opposition to Microsoft Defender’s menace intelligence and machine learning-based detection engines to find out in the event that they pose a danger.

When a consumer receives a message with a flagged URL, a transparent warning will seem immediately inside the chat, alerting them that the hyperlink could also be unsafe.

This warning system additionally informs the sender {that a} hyperlink they shared has been flagged as probably dangerous, permitting them to edit or delete the message.

A key facet of this function is its capacity to re-evaluate URLs even after a message has been delivered.

Suppose a hyperlink is recognized as malicious as much as 48 hours post-delivery. In that case, the system will retroactively apply a warning banner to the message, a course of often called Zero-hour auto purge (ZAP).

This new warning system enhances present safety measures inside the Microsoft 365 ecosystem. It really works alongside Secure Hyperlinks, a function in Microsoft Defender for Workplace 365 that gives time-of-click verification to guard customers from malicious hyperlinks.

Whereas Secure Hyperlinks provides safety upon clicking a hyperlink, the brand new message warnings present an earlier layer of protection by alerting customers earlier than they work together with the URL.

The function additionally integrates with ZAP, which might block messages fully. If ZAP is configured to dam a message containing a recognized malicious URL, that motion will take priority over the warning banner.

For organizations, this layered method creates a extra sturdy protection in opposition to link-based threats which are more and more frequent on collaboration platforms.

The malicious URL safety function will probably be enabled by default as soon as it reaches basic availability in November 2025. Through the public preview interval beginning in September 2025, directors might want to opt-in to activate the warnings.

IT directors can handle the function’s settings via the Groups Admin Heart beneath “Messaging settings” or through PowerShell instructions. This enables organizations to configure the safety to suit their particular safety insurance policies.

Admins are inspired to evaluation these settings, replace any inside documentation, and inform their assist groups in regards to the new performance to make sure a easy rollout.

This replace is a major step in securing the communications of over 320 million month-to-month lively Groups customers from subtle phishing campaigns.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Alerts, Attackers, Automatic, Introduces, Links, Malicious, Microsoft, Teams

Post navigation

Previous Post: How to Use Sandboxing to Analyze Suspicious Files
Next Post: Microsoft Exchange Online Outage for Users Accessing Email via Exchange Online Methods

Related Posts

Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution Cyber Security News
Chinese Hackers Actively Exploiting SharePoint Servers 0-Day Vulnerability in the Wild Cyber Security News
Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform Cyber Security News
Amazon EKS Vulnerabilities Exposes Sensitive AWS Credentials and Escalate Privileges Cyber Security News
Firefox 140 Released With Fix for Code Execution Vulnerability Cyber Security News
Salat Stealer Exfiltrates Browser Credentials Via Sophisticated C2 Infrastructure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories
  • Microsoft Exchange Online Outage for Users Accessing Email via Exchange Online Methods
  • Microsoft Teams Introduces Automatic Alerts for Malicious Links from Attackers
  • How to Use Sandboxing to Analyze Suspicious Files
  • Conversation with Amazon’s Senior Software Development Engineer Naman Jain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories
  • Microsoft Exchange Online Outage for Users Accessing Email via Exchange Online Methods
  • Microsoft Teams Introduces Automatic Alerts for Malicious Links from Attackers
  • How to Use Sandboxing to Analyze Suspicious Files
  • Conversation with Amazon’s Senior Software Development Engineer Naman Jain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News