Microsoft to Discontinue Legacy TLS Versions in Exchange Online by July 2026

Microsoft is putting the brakes on outdated security protocols, announcing that it'll start blocking legacy TLS 1.0 and 1.1 connections to Exchange Online in July 2026 - so it's time to upgrade and stay secure! This move marks the end of an era for older clients that still rely on these outdated protocols.

https://osintsights.com/microsoft-to-discontinue-legacy-tls-versions-in-exchange-online-by-july-2026?utm_source=mastodon&utm_medium=social

#ExchangeOnline #TransportLayerSecurity #Tls10 #Tls11 #Microsoft

Microsoft to Discontinue Legacy TLS Versions in Exchange Online by July 2026

Microsoft blocks legacy TLS 1.0 and 1.1 in Exchange Online by July 2026. Upgrade now to ensure secure connections and avoid disruptions. Learn more today.

OSINTSights

Microsoft Phases Out Legacy TLS in Exchange Online

Microsoft is phasing out support for outdated TLS versions (TLS 1.0 and TLS 1.1) for POP3 and IMAP4 connections to Exchange Online, starting July 2026, to boost security. From then on, only TLS 1.2 or later will be accepted, making older connections obsolete.

https://osintsights.com/microsoft-phases-out-legacy-tls-in-exchange-online?utm_source=mastodon&utm_medium=social

#TransportLayerSecurity #LegacyTlsDeprecation #ExchangeOnline #Microsoft #Tls10

Microsoft Phases Out Legacy TLS in Exchange Online

Learn how Microsoft's Exchange Online will phase out legacy TLS, requiring clients to use TLS 1.2 or later by July 2026, and prepare for a secure transition now.

OSINTSights
Relatedly, I submitted a Pull Request to update MacPorts' libressl-devel to 4.3.1 here:

https://github.com/macports/macports-ports/pull/32314

GitHub Continuous Integration checks are queued. Hopefully they will complete without issues?

Regardless, it's up to someone else with commit access to merge it!

#LibreSSL #MacPorts #TLS #TransportLayerSecurity #SSL #SecureSocketsLayer #Encryption #OpenSource
libressl-devel: update to 4.3.1 by artkiver · Pull Request #32314 · macports/macports-ports

Description Type(s) bugfix enhancement security fix Tested on macOS 26.4.1 25E253 arm64 Command Line Tools 26.4.1.0.1775747724 Verification Have you followed our Commit Message Guideline...

GitHub
I submitted a Pull Request to update MacPorts' LibreSSL to 4.3.1 here:

https://github.com/macports/macports-ports/pull/32313

GitHub Continuous Integration checks are queued. Hopefully they will complete without issues?

Regardless, it's up to someone else with commit access to merge it!

I should do something similar with libressl-devel next.

#LibreSSL #MacPorts #TLS #TransportLayerSecurity #SSL #SecureSocketsLayer #Encryption #OpenSource
libressl: update to 4.3.1 by artkiver · Pull Request #32313 · macports/macports-ports

Description Type(s) bugfix enhancement security fix Tested on macOS 26.4.1 25E253 arm64 Command Line Tools 26.4.1.0.1775747724 Verification Have you followed our Commit Message Guideline...

GitHub

Want to see how we've configured our cipher suites? Our nginx configuration, which complies with the new guidelines, is available here: https://github.com/internetstandards/Internet.nl/blob/main/docker/webserver/nginx_templates/tls.conf.template

So, now is the perfect time to ensure your website and email server meet NCSC's latest TLS guidelines and other modern internet standards. And don’t forget to check out the updated https://Internet.nl starting next Tuesday to ✅ verify your configuration!

2/2

#TransportLayerSecurity #TLS

Internet.nl/docker/webserver/nginx_templates/tls.conf.template at main · internetstandards/Internet.nl

Internet standards compliance test suite. Contribute to internetstandards/Internet.nl development by creating an account on GitHub.

GitHub

👉 Coming soon: fully updated TLS test in new version of Internet.nl

From Tuesday, April 21, 2026, you can use Internet.nl to check whether the secure connection for your website or email is compliant with the *latest* TLS guidelines from @NCSC_NL (https://www.ncsc.nl/en/transport-layer-security/ICT-beveiligingsrichtlijnen-voor-TLS.).

This means that websites and email servers that previously passed the test may now need further improvements.

1/2

#TransportLayerSecurity #TLS

The number of mis-issued 1.1.1.1 certificates grows. Here’s the latest. https://arstechni.ca/pJUk #transportlayersecurity #Certificates #Security #Biz&IT #HTTPS #tls
The number of mis-issued 1.1.1.1 certificates grows. Here’s the latest.

Everything to know about the mishap that threatened to expose millions of users’ queries.

Ars Technica
Mis-issued certificates for 1.1.1.1 DNS service pose a threat to the Internet https://arstechni.ca/ub32 #transportlayersecurity #Certificates #encryption #Security #Biz&IT #tls
Mis-issued certificates for 1.1.1.1 DNS service pose a threat to the Internet

The three certificates were issued in May but only came to light Wednesday.

Ars Technica

About a third of the WWW #TLS traffic is using post-quantum encryption, which is protected against quantum factoring attacks such as Shor's algorithm. This has been achieved since Hybrid ML-KEM has been widely adopted by most web browsers and large service providers such as Cloudflare, Google, AWS, etc. There are no absolute figures available, but for example, Cloudflare has nice statistics about PQ encryption use on their services: https://radar.cloudflare.com/adoption-and-usage#post-quantum-encryption-adoption

The best part of this adoption is that users haven't had to do anything, or even know that this has been happening. As it should be.

#transportlayersecurity #tls #postquantumcryptography #pqc

Hunderte Experten warnen vor staatlichen Root-Zertifikaten

Bald sollen EU-Bürger sich auf grenzüberschreitende elektronische Dienste und Vertrauensstellen verlassen müssen. Experten schlagen Alarm.

heise online