CyberHappenings logo
☰

Track cybersecurity events as they unfold. Sourced timelines, daily updates. Fast, privacy‑respecting. No ads, no tracking.

Microsoft Anti-Spam Engine False Positives Affect Exchange Online and Teams

First reported
Last updated
πŸ“° 1 unique sources, 1 articles

Summary

Hide β–²

Microsoft's anti-spam engine has incorrectly flagged URLs and emails as malicious, causing disruptions in Exchange Online and Microsoft Teams. The issue began on September 5, 2025, affecting URL links and email delivery. Microsoft has identified over 6,000 impacted URLs and is working to resolve the problem. The bug has led to false positive alerts and email quarantines, impacting users globally. The issue stems from the anti-spam engine incorrectly tagging URLs within other URLs as potentially malicious. Microsoft has deployed a partial fix but continues to address residual impacts. The root cause analysis is ongoing.

Timeline

  1. 09.09.2025 16:40 πŸ“° 1 articles Β· ⏱ 7d ago

    Microsoft Anti-Spam Engine False Positives Affect Exchange Online and Teams

    On September 5, 2025, Microsoft's anti-spam engine began incorrectly flagging URLs and emails as malicious, causing disruptions in Exchange Online and Microsoft Teams. The issue has affected over 6,000 URLs, leading to false positive alerts and email quarantines. Microsoft has deployed a partial fix but continues to address residual impacts. The root cause analysis is ongoing.

    Show sources

Information Snippets

Similar Happenings

Windows recovery operations disrupted by August 2025 updates

Microsoft released emergency out-of-band updates to fix a bug in the August 2025 Windows security updates that was causing recovery and reset operations to fail, as well as severe streaming issues with NDI software. The issue affected Windows 10 and older versions of Windows 11. The bug also caused Windows upgrades to fail with 0x8007007F errors on some Windows 11 and Windows Server systems. Additionally, the updates triggered unexpected UAC prompts and app installation issues for non-admin users. The affected updates included KB5063875, KB5063709, and KB5063877. The emergency fixes were released as KB5066189, KB5066188, KB5066187, KB5065426, and KB5065429. These updates are available via Windows Update and the Microsoft Update Catalog. Microsoft also resolved a bug that triggered Windows update failures when installed from a network share using the Windows Update Standalone Installer (WUSA). The September 2025 Windows security update reduces the scope for requiring UAC prompts for MSI repairs and enables IT admins to disable UAC prompts for specific apps by adding them to an allowlist.