Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    VulnCheck Known Exploited Vulnerabilities Report – Summer 2024 | Blog

    April 29, 2026

    Debian Trixie pdns Important Denial of Service Fix DSA-6233-1

    April 29, 2026

    CVE-2026-3325 | THREATINT

    April 29, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Microsoft says backend change broke Teams Free chat and calls
    News

    Microsoft says backend change broke Teams Free chat and calls

    adminBy adminApril 29, 2026No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Microsoft Teams

    Microsoft is working to resolve a known issue that prevents some Microsoft Teams Free users from chatting and calling others.

    Teams Free (also known as Teams for personal use) is a subscription-free version designed for individuals, families, and small community groups, which provides video conferencing, instant messaging, and collaborative file-sharing tools on mobile and desktop platforms for users with a Microsoft account.

    The company blames these problems on a “recently deployed backend change” that skips the onboarding and privacy consent screens for some users, rendering their profiles inaccessible to others.

    image

    While it has yet to share which regions are affected and how many users are impacted by this incident, Microsoft says the first reports surfaced three weeks ago, on April 8.

    Microsoft has also flagged this incident as a “service degradation,” a label usually applied to issues with noticeable user impact that don’t take the service offline.

    “Some new users who signed up during the impact window were incorrectly treated as already onboarded, causing onboarding and privacy consent screens to be skipped, their profiles to appear as ‘Unknown users’ to others, and preventing them from being searchable or reliably reachable in chat,” it said in a service health status update earlier today.

    “We’ve identified a recently deployed backend change is causing new Teams Free users to bypass required onboarding steps, leaving user profiles in an incomplete state. As a result, affected users can not be discovered, connect with others, or successfully complete chat request flows.”

    Microsoft is still looking for a solution to this ongoing issue and has scheduled another update to share any additional details later today.

    Last week, Microsoft acknowledged another issue that is preventing Windows users from joining Teams meetings due to a bug introduced by a recent Microsoft Edge browser update.

    Earlier this month, it also reverted a recent service update that was blocking some customers from launching the Teams desktop client and leaving them stuck on the loading screen with the “We’re having trouble loading your message. Try refreshing.” error message.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCVE-2026-42377 | THREATINT
    Next Article CVE-2026-3325 | THREATINT
    admin
    • Website

    Related Posts

    News

    VulnCheck Known Exploited Vulnerabilities Report – Summer 2024 | Blog

    April 29, 2026
    News

    Intelligence is the Most Important and Most Lucrative Asset in Cybersecurity | Blog

    April 29, 2026
    News

    Hackers are exploiting a critical LiteLLM pre-auth SQLi flaw

    April 28, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    VulnCheck Known Exploited Vulnerabilities Report – Summer 2024 | Blog

    April 29, 2026

    Debian Trixie pdns Important Denial of Service Fix DSA-6233-1

    April 29, 2026

    CVE-2026-3325 | THREATINT

    April 29, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.