Day 197: Familiar Platforms, Unfamiliar Consequences

Today’s round-up cuts across technical and human vectors. From Microsoft Teams being weaponized to deliver malware, to the evolving face of cybersecurity talent, to Google’s AI stepping in to limit exploitation—it’s not just what’s changing, but who is driving that change that stands out.

📎 Hackers Now Using Microsoft Teams as a Malware Delivery Channel

Researchers have uncovered threat actors abusing Microsoft Teams chats to deliver malicious payloads. This isn’t just phishing—Teams, as a trusted collaboration tool, is now being weaponized for initial access. Organizations that assume SaaS collaboration tools are secure “by design” may need to rethink those assumptions.

https://thehackernews.com/2025/07/hackers-leverage-microsoft-teams-to.html

🧠 UNC6148 Targets Fully Patched Systems Using Living-off-the-Land Techniques

Even fully patched environments aren’t safe. UNC6148, a financially motivated threat group, has been observed using legitimate remote management tools to backdoor systems without triggering obvious alerts. Their TTPs bypass traditional patch-based defenses and underline a hard truth: detection and behavioral analytics now matter as much as CVE coverage.

https://thehackernews.com/2025/07/unc6148-backdoors-fully-patched.html

🛑 Google’s AI ‘Big Sleep’ Limits AI Tool Exploitation

Google has implemented a throttle system called Big Sleep—an AI gatekeeper that slows down model responses during exploitation attempts. This is a preventative measure to stop generative AI from being used in malicious contexts, particularly around prompt injection, data inference, or abuse of LLM-powered APIs. A subtle but important shift in how vendors are beginning to govern model behavior dynamically.

https://thehackernews.com/2025/07/google-ai-big-sleep-stops-exploitation.html

🌐 Spotlight: Social and Operational Trends

A new piece in Security Magazine discusses the growing need for soft skills in cybersecurity operations—especially as threat intel teams and IR roles become more collaborative and cross-functional. http://www.securitymagazine.com/articles/101765 Another editorial reflects on how women in cybersecurity are reshaping the field—not just through inclusion efforts, but by challenging long-standing assumptions about what makes a good defender. Less bravado, more strategy. Less gatekeeping, more structure. https://www.darkreading.com/cybersecurity-operations/women-hacked-status-quo-cybersecurity-careers http://www.securitymagazine.com/articles/101766

Key Takeaways

Platforms you trust are becoming vectors. Microsoft Teams isn’t just a meeting tool—it’s now a possible phishing endpoint. Patching is necessary, but not sufficient. UNC6148 reminds us that threat actors adapt around controls, not just through them. AI governance is maturing. Google’s ‘Big Sleep’ model throttling could signal a new generation of self-defending LLM infrastructure. Culture is changing. The cybersecurity talent pool is shifting—more diverse, more cross-functional, and more operationally strategic.