Guest access to Microsoft Teams could allow hackers to bypass some critical security protections



  • Microsoft Teams guest chat feature creates an unprotected attack vector for malware and phishing
  • Guests rely on the host’s security, allowing malicious actors to bypass typical protections.
  • Companies are advised to restrict external invitations, disable chats, and train staff on phishing risks.

A new feature recently added to Microsoft Teams also introduced a “fundamental architectural gap,” a vulnerability that could be exploited to remove malware, share phishing links and more, all without triggering the usual security alarms, experts warned.

Cybersecurity researchers Ontinue discovered that the guest access feature in Microsoft Teams creates an unprotected attack vector.



Leave a Comment

Your email address will not be published. Required fields are marked *