Perimeter
Breaking news, news analysis, and expert commentary on threats to the network perimeter, and the tools & technologies for securing it.
Laptop computer displaying logo of Microsoft Teams![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt13c0e2d5fc814bcc/64f178b4be82847417cbeb9a/teams_monticello_shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale)
Perimeter![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt13c0e2d5fc814bcc/64f178b4be82847417cbeb9a/teams_monticello_shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale)
Microsoft Teams Exploit Tool Auto-Delivers MalwareMicrosoft Teams Exploit Tool Auto-Delivers Malware
The "TeamsPhisher" cyberattack tool gives pen testers — and adversaries — a way to deliver malicious files directly to a Teams user from an external account, or tenant.
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.