Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
NEC Asia Pacific to Showcase Trusted Public Safety and Digital Identit...
Sprinto Expands to Australia with New Data Center to Power Localized, ...
Three strategies for closing the gap between backup and real recovery ...
CVSS 9.6 vulnerabilities in two major PDF tools exploited since late 2...
Q-Day is coming. Are you ready?
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Q-Day is coming. Are you ready?

      Q-Day is coming. Are you ready?

      Tuesday, April 14, 2026, 12:40 PM Asia/Singapore | Features
    • Featured

      How lean defence teams turn endpoint insights into measurable risk reduction

      How lean defence teams turn endpoint insights into measurable risk reduction

      Monday, April 13, 2026, 3:15 PM Asia/Singapore | Features
    • Featured

      Physical and digital security converge in APAC

      Physical and digital security converge in APAC

      Monday, April 6, 2026, 2:22 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

News

Beware of new phishing attack vector coming your way

By CybersecAsia editors | Tuesday, November 11, 2025, 8:30 AM Asia/Singapore

Beware of new phishing attack vector coming your way

Anyone could soon target you for a chat session, using a new feature enabled by default in a popular collaboration tool.

While the world tries to plug every loophole and risk that could expose people to phishing attacks, one software giant is toying with just the opposite.

In a feature expected to roll out starting November 2025, users of Microsoft Teams will be able to initiate chats with anyone just by supplying an email address, without requiring the recipient to be a Teams user.

This update, aimed at enhancing seamless collaboration across platforms such as Android, desktop, iOS, Linux, and Mac, allows external guest users to join conversations via email invites under Microsoft Entra B2B Guest policies. While it aims to improve flexibility in communication, cybersecurity experts have raised alarms about significant security risks associated with the default-enabled setting.

The primary concern is the increased attack surface:

  • By allowing external email-based chat initiations without prior validation or vetting, the feature opens avenues for phishing attacks and malware distribution. Malicious actors could send spoofed chat invites posing as trusted contacts or business partners, tricking employees into clicking harmful links, sharing credentials, or unknowingly exposing proprietary information.
  • This vector is likened to OAuth phishing campaigns, which rely heavily on impersonation to harvest sensitive data. The risks are compounded because file exchanges within Teams may bypass traditional email security filters, raising the threat of ransomware or spyware infiltrations.
  • Microsoft advises organizations to update internal policies and train staff on the new functionality. Administrators can mitigate risks by disabling the feature through PowerShell, using the TeamsMessagingPolicy attribute ‘UseB2BInvitesToAddExternalUsers’ set to false, thus restricting chats to vetted external users only.

Experts recommend additional security measures such as enforcing multi-factor authentication, conducting regular audits, and running comprehensive phishing awareness training.

Overall, while the new Teams feature offers improved external communication capabilities, the illogical choice to enable it by default will place the onus of security and privacy vigilance on users.

Share:

PreviousAPAC Threat Intelligence Latest Insights: 79% of Enterprises to Increase Investment in Threat Intelligence
NextSep–Nov 2025 data breaches in review: Prevention and proactive-ness are key

Related Posts

Before the Night Race, Singapore engages in another race

Before the Night Race, Singapore engages in another race

Thursday, September 19, 2024

In order to be cyber insured, first make your firm cybersecure!

In order to be cyber insured, first make your firm cybersecure!

Thursday, December 1, 2022

State-sponsored threat actors step up activities in four vectors: report

State-sponsored threat actors step up activities in four vectors: report

Thursday, August 29, 2024

Eight key application security testing features to look out for

Eight key application security testing features to look out for

Friday, February 26, 2021

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Cyber protection for medical clinics in Singapore

    Cyber protection for medical clinics in Singapore

    As Singapore’s healthcare sector becomes increasingly digital and interconnected, clinics are facing heightened cyber risks, …Read more
  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more

Bottom sidebar

Other News

  • NEC Asia Pacific to Showcase Trusted Public Safety and Digital Identity Innovations at Milipol TechX 2026

    Wednesday, April 15, 2026
    SINGAPORE, April 14, 2026 /PRNewswire/ …Read More »
  • Sprinto Expands to Australia with New Data Center to Power Localized, Audit-Ready Compliance

    Wednesday, April 15, 2026
    Sprinto combines local infrastructure with …Read More »
  • Hong Kong Anti-graft Watchdog: Clean Governance and Ethical Business is Key to Hong Kong’s Sustainable Business Development

    Thursday, April 9, 2026
    HONG KONG, April 9, 2026 …Read More »
  • Goodix Launches the World’s First eSE Solution Designed for AI Agents

    Thursday, April 9, 2026
    SHENZHEN, China, April 8, 2026 …Read More »
  • LRQA Amplifies Industrial and Cyber Resilience in APAC at CS4CA Summit 2026

    Thursday, April 9, 2026
    SINGAPORE, April 8, 2026 /PRNewswire/ …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.