{"id":421336,"date":"2026-03-05T08:16:04","date_gmt":"2026-03-05T02:46:04","guid":{"rendered":"https:\/\/dripp.zone\/news\/microsoft-draws-internet-ire-over-wave-of-email-blocking-crypto-news\/"},"modified":"2026-03-05T09:33:57","modified_gmt":"2026-03-05T04:03:57","slug":"microsoft-draws-internet-ire-over-wave-of-email-blocking-crypto-news","status":"publish","type":"post","link":"https:\/\/dripp.zone\/news\/microsoft-draws-internet-ire-over-wave-of-email-blocking-crypto-news\/","title":{"rendered":"Microsoft Draws Internet Ire Over Wave of Email Blocking &#8211; Crypto News"},"content":{"rendered":"<p><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.microsoft.com\/\">Microsoft\u2019s<\/a> email blocking practices have reportedly drawn complaints from a host of internet users.<\/p>\n<div id=\"article-paywall-hidden-content\">\n<p>As The Register <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.theregister.com\/2026\/03\/04\/users_fume_at_outlookcom_email\/\">reported<\/a> Wednesday (March 4), the company spent last week rejecting messages to Outlook recipients in what the report characterized as either a fault or overzealous security rules. One source called the situation \u201ccarnage.\u201d<\/p>\n<p>According to the report, the issue affected certain IP addresses, whose emails were rejected for either appearing on a block list or violating reputation rules.<\/p>\n<p>The Register cited comments from a reader who in late January noticed a \u201csudden spike in customers\u2019 static IPs being rejected by only Microsoft Outlook free\/personal accounts.\u201d<\/p>\n<p>The message returned was a 550, informing customers to contact their Internet Service Provider (ISP) \u201csince part of their network is on our block list.\u201d<\/p>\n<p>The report noted that while block lists can help prevent spam or addresses associated with junk mail, this reader\u2019s company had not run afoul of Microsoft, and the company\u2019s Smart Network Data Service (SNDS) showed no issues with the IP.<\/p>\n<div id=\"pymnt-3189248159\" class=\"pymnt-content\" style=\"margin-top: 50px;\">\n<p style=\"text-align:center\">Advertisement: Scroll to Continue<\/p>\n<\/div>\n<p>\u201cWe\u2019re also a member of their JMRP (Junk Mail Reporting Program),\u201d the source told the Register, \u201cwhich is intended to inform us when people are reporting spam sent from our IPs \u2013 except, we never get any reports.\u201d<\/p>\n<div class=\"mid-content-graphic my-4 my-lg-5\">\n<div class=\"ps-preferred-source\">\n<div class=\"ps-preferred-source__logo\"><\/div>\n<div class=\"ps-preferred-source__content\">\n<p>We\u2019d love to be your <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.google.com\/preferences\/source?q=pymnts.com\" target=\"_blank\" rel=\"noopener\">preferred source for news<\/a>.<\/p>\n<p>Please add us to your preferred sources list so our news, data and interviews show up in your feed. Thanks!<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<p>This reader wasn\u2019t alone, the report said, with users on Microsoft\u2019s support forums reporting similar problems throughout February into this week.<\/p>\n<p>The Register report noted one of the impacts of this issue: preventing businesses from responding to things like vendor errors, thus harming their reputation.<\/p>\n<p>PYMNTS has reached out to Microsoft for comment, but has not yet gotten a reply aside from their acknowledgement of our initial contact.<\/p>\n<p>In other cybersecurity news, PYMNTS wrote earlier this week about how the latest conflict in the Middle East <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.pymnts.com\/cybersecurity\/2026\/where-middle-east-conflict-elevates-cyber-threats-for-global-business\/\">raises risks for businesses<\/a>.<\/p>\n<p>\u201cCyberattacks, which can often be conducted by non-state aligned individuals or ideologically motivated groups, are growing increasingly likely in times of heightened geopolitical confrontation,\u201d that report said.<\/p>\n<p>Exacerbating the issue in 2026 is the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.pymnts.com\/news\/b2b-payments\/2026\/what-cfos-should-be-thinking-about-sensitive-data-in-the-age-of-ai\/'\">rise of technologies<\/a> that operate beyond traditional IT governance frameworks. This vulnerability layer, composed of so-called \u201cshadow AI\u201d and unsanctioned applications, can come about as companies rapidly employ <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.pymnts.com\/cpi-posts\/ai-powered-cyberattacks-pose-new-security-and-regulatory-compliance-challenges\/\">AI-powered tools<\/a>, often without formal risk controls or visibility, and inadvertently heighten their attack surface.<\/p>\n<p>This unmonitored layer can both introduce new vulnerabilities and obscure the tracking of risk propagation back to the enterprise,\u201d PYMNTS added.<\/p>\n<p>\u201cIt\u2019s a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.pymnts.com\/supply-chain\/2025\/chief-financial-officers-find-success-supply-chain-mapping\/\">challenging security paradox<\/a> for today\u2019s supply chain leaders. The more they embrace strategies and solutions designed to enhance the visibility and resilience of their operations, the more potential entry points there are that may need to be safeguarded from criminals.\u201d<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft\u2019s email blocking practices have reportedly drawn complaints from a host of internet users. As The Register reported Wednesday (March 4), the company spent last week rejecting messages to Outlook recipients in what the report characterized as either a fault or overzealous security rules. One source called the situation \u201ccarnage.\u201d According to the report, the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":421339,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[188,183,185,186,187,184,189,150,182,190],"class_list":["post-421336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-blockchain-tech","tag-blockchain-technology","tag-crypto-technology","tag-cryptocurrency-technology","tag-metaverse-technology","tag-nft-technology","tag-soul-bound-token","tag-tech","tag-technology","tag-token-technology"],"_links":{"self":[{"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/posts\/421336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/comments?post=421336"}],"version-history":[{"count":1,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/posts\/421336\/revisions"}],"predecessor-version":[{"id":421340,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/posts\/421336\/revisions\/421340"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/media\/421339"}],"wp:attachment":[{"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/media?parent=421336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/categories?post=421336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dripp.zone\/news\/wp-json\/wp\/v2\/tags?post=421336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}