Microsoft investigates a fall in Outlook.com that for hours causes intermittent failures in the early session and leaves many users without access to their mailboxes; public monitoring systems, such as Downdetector, show thousands of reports focused on connection problems and errors when authenticated.
According to the company itself, several users are being disconnected and receive messages from too many requests (too many requests), which points to a possible problem of throttling or congestion in authentication flows. Microsoft has pointed out that login scenarios from customers (apps or integrations) may be contributing to behavior and that they are validating interactions between service components to determine the following steps.

Microsoft's "service degradation" label indicates a perceptible impact for users, but not a total fall in service. This changes the management of the incident: it is a question of mitigating effects and restoring service levels without the need for a complete rollback, but it forces IT teams and users to act with caution so as not to worsen the situation with massive reattempts.
For end-users, the immediate useful measures are simple and safe: first consult the official status page of Microsoft 365 at status.office.com before accepting emails or messages that promise a solution, avoid introducing credentials on unverified websites or links and moderate login reattempts (continuous attempts can aggravate a request limit error).
If you can work, try alternative methods with caution: open Outlook in untold mode or after cleaning browser cache can help in some scenarios, while log in from the mobile app can work better than third party customers. Do not make mass password resets unless the company confirms a security problem: massive changes in credentials during availability incidents create additional burden and confusion.
For Microsoft 365 administrators and IT managers, the priority is internal communication and operational containment: to activate communication channels that inform users about the known state, to monitor the Message Center and Service Health at the Microsoft management center, and to postpone configuration changes or deployments involving mass authentication. It is also appropriate to review rules of reattempt in integrations and any automation that can generate log peaks.

From a security perspective, there are side risks: authentication incidents can be used by phishing campaigns that pose as Microsoft notices requesting credentials. Always check official sources before following instructions by mail and, where possible, require multifactor authentication to mitigate impact if credentials are compromised.
In the medium term, organizations should review their resilience to cloud service outages: emergency access policies, support accounts with minimum permissions for critical tasks and continuity procedures for local or alternative timelines and communications. The recurrent occurrence of problems on mail platforms underlines the need for plans that do not depend exclusively on a single failure point.
We will follow the evolution of the incident and how Microsoft communicates the root cause; meanwhile, the combination of verification of official sources, restraint in reattempts and preventive security and continuity measures is the best recipe to reduce both the operational interruption and the risk of exploitation during these falls. For real-time information see the status links and user reports, such as the Downdetector and the official Microsoft 365 page.
Related
More news on the same subject.

Safety alert Drug critical vulnerability of SQL injection in PostgreSQL requires immediate update
Drucal has published safety updates for a vulnerability qualified as "highly critical" which affects Drumal Core and allows an attacker to achieve arbitrary SQL injection in sit...

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...