Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft to Add Brand Impersonation Protection Warning to Teams Calls

Microsoft to Add Brand Impersonation Protection Warning to Teams Calls

Posted on January 23, 2026January 23, 2026 By CWS

A brand new safety function for Groups Calling now alerts customers to suspicious exterior calls that attempt to impersonate trusted organizations.

The function will start deployment in mid-February 2026 for Focused Launch clients, with basic availability timelines to be communicated later.

Model Impersonation Safety is a proactive safety safeguard that evaluates inbound Voice over IP (VoIP) calls from first-contact exterior callers for indicators of fraud or deception.

The function is designed to scale back social engineering dangers and voice phishing (vishing )assaults, wherein malicious actors pose as reputable corporations to steal delicate info or manipulate customers into taking dangerous actions.

When Groups detects a high-risk name, customers will see warning messages earlier than answering.

If danger alerts persist through the dialog, warnings might proceed all through the decision. Customers will have the ability to settle for, block, or finish suspicious calls based mostly on these alerts.

In line with Message Middle ID MC1219793, the function will 2ESDDCCbe enabled by default for all organizations utilizing Microsoft Groups Calling.

Focused Launch clients can anticipate deployment beginning mid-February 2026, with completion anticipated by late February 2026.

Common availability dates might be introduced in future communications. The function is supported on Desktop and Mac platforms and doesn’t require any modifications to present Groups Calling insurance policies.

Organizational Affect and Preparation

Microsoft confirmed that no administrative motion is required for deployment. Nevertheless, IT groups ought to put together for the rollout by informing helpdesk employees concerning the new high-risk name warnings that customers might encounter.

Organizations are additionally inspired to replace inside coaching supplies to coach staff on how to answer model impersonation alerts.

The function aligns with Microsoft’s ongoing dedication to caller id safety and safe collaboration, addressing the rising risk of fraudulent calls focusing on enterprise environments.

No compliance concerns have been recognized, although organizations ought to evaluate the function according to their particular regulatory necessities.

Microsoft will replace documentation on caller ID safety earlier than the rollout begins, offering extra steering for directors and safety groups.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Add, Brand, Calls, Impersonation, Microsoft, Protection, Teams, Warning

Post navigation

Previous Post: Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls
Next Post: Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports

Related Posts

Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character Cyber Security News
Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks Cyber Security News
New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways Cyber Security News
New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads Cyber Security News
Ransomware Actors Targeting Global Public Sectors and Critical Services in Targeted Attacks Ransomware Actors Targeting Global Public Sectors and Critical Services in Targeted Attacks Cyber Security News
70,000+ MongoDB Servers Vulnerable to MongoBleed Exploit 70,000+ MongoDB Servers Vulnerable to MongoBleed Exploit Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News