toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

269
active users

#sharepoint

4 posts3 participants0 posts today
Pyrzout :vm:<p>August 2025 Patch Tuesday forecast: Try, try, again <a href="https://www.helpnetsecurity.com/2025/08/08/august-2025-patch-tuesday-forecast/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/08/08</span><span class="invisible">/august-2025-patch-tuesday-forecast/</span></a> <a href="https://social.skynetcloud.site/tags/Expertanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Expertanalysis</span></a> <a href="https://social.skynetcloud.site/tags/PatchTuesday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchTuesday</span></a> <a href="https://social.skynetcloud.site/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/Mozilla" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mozilla</span></a> <a href="https://social.skynetcloud.site/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> <a href="https://social.skynetcloud.site/tags/Ivanti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ivanti</span></a> <a href="https://social.skynetcloud.site/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a></p>
Günter Born<p>Hey, we don't need a hacker for <a href="https://social.tchncs.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> gate; Microsoft used software engineers in China for SharePoint (on-premises) Support</p><p><a href="https://borncity.com/win/2025/08/05/new-insights-on-sharepoint-gate-microsoft-uses-employees-from-china-for-maintenance/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">borncity.com/win/2025/08/05/ne</span><span class="invisible">w-insights-on-sharepoint-gate-microsoft-uses-employees-from-china-for-maintenance/</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> Used <a href="https://mastodon.thenewoil.org/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a>-Based Engineers to Support Product Recently Hacked by China</p><p><a href="https://www.propublica.org/article/microsoft-sharepoint-hack-china-cybersecurity" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">propublica.org/article/microso</span><span class="invisible">ft-sharepoint-hack-china-cybersecurity</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> gangs join attacks targeting <a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.thenewoil.org/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> servers</p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-join-attacks-targeting-microsoft-sharepoint-servers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/ransomware-gangs-join-attacks-targeting-microsoft-sharepoint-servers/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a></p>
Erik Jonker<p>Interesting....<br><a href="https://www.propublica.org/article/microsoft-sharepoint-hack-china-cybersecurity" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">propublica.org/article/microso</span><span class="invisible">ft-sharepoint-hack-china-cybersecurity</span></a><br><a href="https://mastodon.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://mastodon.social/tags/sharepoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sharepoint</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/china" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>china</span></a></p>
Spocko<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@demiguru" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>demiguru</span></a></span> <br>Okay. But *I* AM NOT connecting the <a href="https://mastodon.online/tags/Epstein" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Epstein</span></a> FBI <a href="https://mastodon.online/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> file exposure to that story. I appreciate you pointing out some possible false connections.<br>I'm looking ahead to how lists that we know DO exist, might end up in hands of groups OTHER than the FBI &amp; DOJ. </p><p>Who might have them &amp; how they might use them are all of interest to me.</p>
Zach<p><span class="h-card" translate="no"><a href="https://mastodon.online/@spocko" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>spocko</span></a></span> <br>The <a href="https://fosstodon.org/tags/conspiracy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>conspiracy</span></a>-like part is connecting the <a href="https://fosstodon.org/tags/Epstein" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Epstein</span></a> FBI <a href="https://fosstodon.org/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> file exposure to the recent <a href="https://fosstodon.org/tags/Chinese" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chinese</span></a> <a href="https://fosstodon.org/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a> <a href="https://fosstodon.org/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a>, potentially implying it was either:<br>exploited intentionally,<br>the result of deep systemic failure,<br>or even deliberate mishandling tied to a broader cover-up.<br>There’s currently no <a href="https://fosstodon.org/tags/credible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>credible</span></a> evidence backing that link. Misconfiguration is a more parsimonious explanation for the older <a href="https://fosstodon.org/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a> case. <a href="https://fosstodon.org/tags/conspiracytheorists" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>conspiracytheorists</span></a> <a href="https://fosstodon.org/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Spocko<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@demiguru" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>demiguru</span></a></span> <br>What part is the conspiracy theory?<br>It appears some <a href="https://mastodon.online/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> servers were venerable over a specific time period. Including <a href="https://mastodon.online/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a> servers?<br><a href="https://www.muellershewrote.com/p/the-epstein-cover-up-at-the-fbi" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">muellershewrote.com/p/the-epst</span><span class="invisible">ein-cover-up-at-the-fbi</span></a><br> "Additionally, the internal SharePoint site the bureau ended up using to distribute the files toward the end did not have the usual restricted permissions. This left the Epstein and Maxwell files open to viewing by a much larger group of people than previously thought."<br>Bondi's incompetence is real. How can we use it?</p>
Zach<p><span class="h-card" translate="no"><a href="https://mastodon.online/@spocko" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>spocko</span></a></span> it’s <a href="https://fosstodon.org/tags/conspiracytheory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>conspiracytheory</span></a>. <a href="https://fosstodon.org/tags/Reuters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Reuters</span></a> reports <a href="https://fosstodon.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> is looking whether a leak from MAPP enabled <a href="https://fosstodon.org/tags/Chinese" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chinese</span></a> to exploit <a href="https://fosstodon.org/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://fosstodon.org/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> b4 fixes were fully in place.notifications went out on 6/24, 7/3, and 7/7; attack signs began on 7/7—the same day the final notification was issued. <a href="https://fosstodon.org/tags/TrendMicro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TrendMicro</span></a> called it the “likeliest scenario” that someone in the program weaponized that info. They pulled the trigger on the <a href="https://fosstodon.org/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> they had at hand bc time was running out.</p>
Spocko<p>Question for my <a href="https://mastodon.online/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> friends<br><span class="h-card" translate="no"><a href="https://mastodon.social/@emptywheel" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>emptywheel</span></a></span> talked about how FBI agents reviewing the <a href="https://mastodon.online/tags/Epstein" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Epstein</span></a> <a href="https://mastodon.online/tags/Maxwell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Maxwell</span></a> materials put together a list for <a href="https://mastodon.online/tags/PamBondi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PamBondi</span></a> &amp; placed it on an internal <a href="https://mastodon.online/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> server.<br><a href="https://www.muellershewrote.com/p/the-epstein-cover-up-at-the-fbi" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">muellershewrote.com/p/the-epst</span><span class="invisible">ein-cover-up-at-the-fbi</span></a> <br> <span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>briankrebs</span></a></span> wrote about this <a href="https://mastodon.online/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> exploit 7-21-25 <a href="https://krebsonsecurity.com/2025/07/microsoft-fix-targets-attacks-on-sharepoint-zero-day/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2025/07/mi</span><span class="invisible">crosoft-fix-targets-attacks-on-sharepoint-zero-day/</span></a><br>Do you think a group has that info?<br>If so, what's the best way to use existence of that hacked list as POLITICAL leverage against DJT to get the full list out?<br><span class="h-card" translate="no"><a href="https://mstdn.social/@nicolesandler" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>nicolesandler</span></a></span> <a href="https://www.youtube.com/live/thdaQyDzYFI?si=EjKSqi7B3cRCBIO4&amp;t=4110" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/live/thdaQyDzYFI?s</span><span class="invisible">i=EjKSqi7B3cRCBIO4&amp;t=4110</span></a></p>
Karl Voit :emacs: :orgmode:<p><a href="https://graz.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> ist, wenn so ein Artikel geschrieben wird: Hier wird das <a href="https://graz.social/tags/Sharepoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sharepoint</span></a>-Patch-Chaos eingeordnet, damit man nicht nur Patches einspielt, die das zugrundeliegende Problem offenbar keineswegs beheben, wie sie behauptet haben: <a href="https://www.heise.de/news/Microsofts-Sharepoint-Luecken-Die-Zero-Days-die-vielleicht-gar-keine-waren-10505387.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Microsofts-Share</span><span class="invisible">point-Luecken-Die-Zero-Days-die-vielleicht-gar-keine-waren-10505387.html</span></a></p>
Daily Azure Shit<p>Day 482. In one of <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a>'s recent security breaches, attackers were able to bypass API authentication by simply supplying a Referer header that indicates that the user just logged out.<br>This seems to be this multilayered defense-in-depth security Microsoft is always bragging about.</p>
ProPublica<p><a href="https://newsie.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> Used China-Based Engineers to Support Product Recently Hacked by <a href="https://newsie.social/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a><br>==</p><p>Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in its popular <a href="https://newsie.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> software but didn’t mention that it has long used China-based engineers to maintain the product.</p><p><a href="https://newsie.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://newsie.social/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://newsie.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://newsie.social/tags/Government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Government</span></a> <a href="https://newsie.social/tags/Safety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Safety</span></a> <a href="https://newsie.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> </p><p><a href="https://www.propublica.org/article/microsoft-sharepoint-hack-china-cybersecurity" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">propublica.org/article/microso</span><span class="invisible">ft-sharepoint-hack-china-cybersecurity</span></a></p>
Jukka Niiranen<p><span class="h-card" translate="no"><a href="https://circumstances.run/@davidgerard" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>davidgerard</span></a></span> How about the "3 million agents" that have been created on Microsoft's cloud in the past year, according to their FY25 Q4 earnings call? Because in reality, the vast majority of the agents are like this: <a href="https://www.youtube.com/watch?v=hpeOjtcA3VY" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=hpeOjtcA3VY</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://mstdn.social/tags/Copilot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Copilot</span></a> <a href="https://mstdn.social/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft365</span></a></p>
heise online English<p>Gaps in Microsoft SharePoint: Zero days that may not have been zero days at all</p><p>The attacks on SharePoint servers exploited known vulnerabilities for which patches were already available. It remains to be seen whether these would've helped.</p><p><a href="https://www.heise.de/en/news/Gaps-in-Microsoft-SharePoint-Zero-days-that-may-not-have-been-zero-days-at-all-10505528.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Gaps-in-Micro</span><span class="invisible">soft-SharePoint-Zero-days-that-may-not-have-been-zero-days-at-all-10505528.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Microsofts Sharepoint-Lücken: Die Zero-Days, die vielleicht gar keine waren</p><p>Die Angriffe auf Sharepoint-Server nutzten keine neuen sondern bekannte Lücken aus, für die es bereits Patches gab. Ob die geschützt hätten, ist jedoch offen.</p><p><a href="https://www.heise.de/news/Microsofts-Sharepoint-Luecken-Die-Zero-Days-die-vielleicht-gar-keine-waren-10505387.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Microsofts-Share</span><span class="invisible">point-Luecken-Die-Zero-Days-die-vielleicht-gar-keine-waren-10505387.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Jan Vlug<p>About the <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> breach (which for example hit the <a href="https://mastodon.social/tags/Dutch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Dutch</span></a> public prosecutor office):</p><p>"This wasn’t just a technical failure; it was a cultural one. The big tech model rewards scale and uniformity, but in doing so, it sacrifices resilience and diversity."</p><p><a href="https://puri.sm/posts/sharepoint-zero-day-breach-hits-hundreds-of-companies-affecting-thousands-of-users-why-pureos-and-linux-servers-are-a-safer-alternative/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">puri.sm/posts/sharepoint-zero-</span><span class="invisible">day-breach-hits-hundreds-of-companies-affecting-thousands-of-users-why-pureos-and-linux-servers-are-a-safer-alternative/</span></a></p><p>"We need to move beyond the illusion of convenience and embrace a model that values sovereignty, separation, and control."</p><p><a href="https://mastodon.social/tags/Purism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Purism</span></a> <a href="https://mastodon.social/tags/PureOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PureOS</span></a> <a href="https://mastodon.social/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.social/tags/overheid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>overheid</span></a> <a href="https://mastodon.social/tags/OM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OM</span></a> <a href="https://mastodon.social/tags/DigitalSovereignty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalSovereignty</span></a></p>
Hdunagan<p>SharePoint: many companies created sites back in the day, but does anyone keep the up to date? Yesterday I found a homepage link that said “works only in Internet Explorer.” <a href="https://mastodon.social/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a></p>
Daniel Fisher(lennybacon)<p><span class="h-card" translate="no"><a href="https://hachyderm.io/@alvinashcraft" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>alvinashcraft</span></a></span> „all built to the highest Microsoft standards of security, privacy and performance trusted by billions of people and businesses worldwide“</p><p>The same standards used to make <a href="https://infosec.exchange/tags/Sharepoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sharepoint</span></a> 🤡</p><p>Do not count me in. I can browse the web on my own. I don’t need that kind of help…</p>
kim_harding ✅<p>Microsoft spotlights Apple bug patched in March as SharePoint exploits continue <br><a href="https://www.theregister.com/2025/07/28/microsoft_spots_apple_bug/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/07/28/mic</span><span class="invisible">rosoft_spots_apple_bug/</span></a></p><p>Now, why would they do that...? 🤔 <br><a href="https://mastodon.scot/tags/DitchMicrosoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DitchMicrosoft</span></a> <a href="https://mastodon.scot/tags/DontTrustMicrosoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DontTrustMicrosoft</span></a> <a href="https://mastodon.scot/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a></p>