400 Million Reasons Hackers Will Target Microsoft Again…

July 22, 2025

Yesterday, like many others in the tech community, I found myself pausing to fully grasp the implications of the Microsoft SharePoint hack. As one of the most widely adopted document management and collaboration platforms globally, SharePoint’s compromise inevitably sends ripples of concern through businesses everywhere.

This news reminded me of a conversation I had just last week with an enterprise customer. We were discussing how one might approach cybersecurity from a hacker’s perspective. A central principle in that hypothetical exercise is the pursuit of maximum impact with minimal effort. Hackers, after all, are often efficient opportunists, targeting widely adopted technologies to maximize disruption and financial gain.

The SharePoint incident perfectly illustrates this risk. Because many organizations rely on SharePoint, the ripple effects of a single breach can become widespread, rapidly causing collective anxiety about individual deployments. Naturally, many IT leaders today are now asking, “How secure is our own implementation?”

This incident also highlights why I consistently advise customers to exercise caution when relying solely on Microsoft security tools, such as Microsoft Defender for Office 365, for email security. With email remaining the primary attack vector (responsible for more than 90% of cyber threats), getting this defense strategy right is critical.

While exact adoption figures for Microsoft Defender for Office 365 are challenging to pinpoint, estimates suggest around 400 million users globally, primarily due to its inclusion within common Microsoft licensing bundles. Viewing this through the lens of a cyber attacker focused on efficiency, a platform of this scale presents an irresistible opportunity, offering substantial disruption and potential financial rewards from just a single successful exploit.

That’s why I encourage organizations to adopt specialized, dedicated solutions for their email security. Platforms such as Abnormal AI, designed explicitly for email threat detection and prevention, provide focused, advanced protection. Investing strategically in dedicated defenses rather than settling for bundled solutions can dramatically reduce exposure and minimize the impact of future breaches.

See how you can strengthen your defenses beyond Microsoft’s built-in tools – schedule a consultation with Teneo today.

Author: Brett Ayres, CTO, Teneo

Contact us - We’d love to help you





    Teneo collects your personal data when you complete our online forms. We will use this information to provide an accurate response to your questions or requests and we will keep a record of your form completion in our CRM system. By submitting this form, you agree to us contacting you for the purpose of our response. For more information explaining how we use your personal data, please see our Privacy Policy.

    Cookie Policy

    This website uses cookies so we can provide you with the best user experience possible.

    Cookies are small files containing information that enables a website to recognise you. They’re downloaded to the device you use when you visit a website and sent back to that website each time you re-visit, or sent to another website that recognises the same cookie.

    Our cookie policy tells you how and why we use cookies, and how this allows us to improve your online experience. You can read our full Cookie Policy here.

    Strictly Necessary Cookies

    Strictly necessary cookies include session cookies and persistent cookies. Session cookies keep track of your current visit and how you navigate the site. They only last for the duration of your visit and are deleted from your device when you close your Internet browser. Persistent cookies last after you’ve closed your Internet browser and enable our website to recognise you as a repeat visitor and remember your actions and preferences when you return.

    Third Party Cookies

    Third party cookies include performance cookies and targeting cookies. Performance cookies collect information about how you use a website, e.g. which pages you go to most often, and if you get error messages from web pages. These cookies don’t collect information that identifies you personally as a visitor, although they might collect the IP address of the device you use to access the site. Targeting cookies collect information about your browsing habits. They are usually placed by advertising networks such as Google. The cookies remember that you have visited a website and this information is shared with other organisations such as media publishers.

    Keeping these cookies enabled helps us to improve our website and display content that is more relevant to you and your interests across the Google content network.