• A sophisticated vulnerability in Microsoft 365 Copilot (M365 Copilot) that allows attackers to steal sensitive tenant data, including recent emails, through indirect prompt injection attacks.

    The flaw, detailed in a blog post published today by researcher Adam Logue, exploits the AI assistant’s integration with Office documents and its built-in support for Mermaid diagrams, enabling data exfiltration without direct user interaction beyond an initial click.

    The attack begins when a user asks M365 Copilot to summarize a maliciously crafted Excel spreadsheet. Hidden instructions, embedded in white text across multiple sheets, use progressive task modification and nested commands to hijack the AI’s behavior.

    These indirect prompts override the summarization task, directing Copilot to invoke its search_enterprise_emails tool to retrieve recent corporate emails. The fetched content is then hex-encoded and fragmented into short lines to bypass Mermaid’s character limits.

    Microsoft 365 Copilot Data Exfiltration Via Deceptive Diagrams

    Copilot generates a Mermaid diagram, a JavaScript-based tool for creating flowcharts and charts from Markdown-like text that masquerades as a “login button” secured with a lock emoji.

    The diagram includes CSS styling for a convincing button appearance and a hyperlink embedding the encoded email data.

    When the user clicks it, believing it’s needed to access the document’s “sensitive” content, the link directs to the attacker’s server, such as a Burp Collaborator instance. The hex-encoded payload transmits silently, where it can be decoded from server logs.

    Mermaid’s flexibility, including CSS support for hyperlinks, made this vector particularly insidious. Unlike direct prompt injection, where attackers converse with the AI, this method hides commands in benign files like emails or PDFs, making it stealthy for phishing campaigns.

    Adam Logue noted similarities to a prior Mermaid exploit in Cursor IDE, which enabled zero-click exfiltration via remote images, though M365 Copilot required user interaction.

    The payload, after extensive testing, was inspired by Microsoft’s TaskTracker research on detecting “task drift” in LLMs. Despite initial challenges reproducing the issue, Microsoft validated the chain and patched it by September 2025, removing interactive hyperlinks from Copilot’s rendered Mermaid diagrams.

    The discovery timeline shows that there were challenges in coordination. Adam Logue reported the complete situation on August 15, 2025, after discussions with the Microsoft Security Response Center (MSRC) staff at DEFCON.

    After iterations, including video proofs, MSRC confirmed the vulnerability on September 8 and resolved it by September 26. However, M365 Copilot fell outside the bounty scope, denying a reward.

    This incident underscores risks in AI tool integrations, especially for enterprise environments handling sensitive data. As LLMs like Copilot connect to APIs and internal resources, defenses against indirect injections remain critical.

    Microsoft emphasized ongoing mitigations, but experts urge users to verify document sources and monitor AI outputs closely.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have shed light on the inner workings of a botnet malware called PolarEdge. PolarEdge was first documented by Sekoia in February 2025, attributing it to a campaign targeting routers from Cisco, ASUS, QNAP, and Synology with the goal of corralling them into a network for an as-yet-undetermined purpose. The TLS-based ELF implant, at its core, is designed to monitor

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  •  A vulnerability in Microsoft 365 Copilot allowed attackers to trick the AI assistant into fetching and exfiltrating sensitive tenant data by hiding instructions in a document. The AI then encoded the data into a malicious Mermaid diagram that, when clicked, sent the stolen information to an attacker’s server. When Microsoft 365 Copilot was asked to […]

    The post Microsoft 365 Copilot Flaw Lets Hackers Steal Sensitive Data via Indirect Prompt Injection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Wilmington, Delaware, October 21st, 2025, CyberNewsWire

    Sendmarc has announced the appointment of Dan Levinson as Customer Success Director – North America, furthering the company’s regional expansion and commitment to providing expert, locally aligned support to organizations across the continent.

    Levinson will lead the development of customer success programs that help businesses strengthen their email security and achieve full compliance with Domain-based Message Authentication, Reporting, and Conformance (DMARC). 

    With over 15 years of experience spanning email security, email deliverability, account management, product management, and leadership, Levinson brings deep expertise in implementing and managing email authentication protocols, including Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and DMARC.

    He has helped organizations apply these standards effectively to reduce impersonation risks and improve deliverability. His work has also driven measurable operational improvements, including a 25% reduction in support cases during a period of 20% year-over-year customer growth. 

    In his new role, Levinson will focus on building a customer success team designed to provide responsive, expert-level support to Sendmarc’s North American clients.

    His team will work closely with customers to strengthen the adoption of DMARC and related standards, enabling advanced protection and improved visibility across their email environments. 

    “Joining Sendmarc has allowed me to continue an incredibly rewarding career in cybersecurity. The position affords me an opportunity to remain on the front lines, engaging directly with customers, as well as draw on my leadership experience to build a high-performing team to expand our North American presence,” said Levinson.

    “Sendmarc has built every capability modern DMARC users expect, without compromising on standards or email deliverability best practices that are often overlooked by other providers in the space. What I’m most impressed with, though, is the dedication and subject matter expertise across the global customer success team. Most team members have had successful careers in other areas of cybersecurity, which strengthens the care and support our customers receive. I honestly couldn’t ask for more when I consider the capabilities and sophistication of the platform, the dedicated staff, and the incredibly trusting leadership group here. Sendmarc is the DMARC solution that the North American market should be very excited about.” 

    Rob Bowker, North America Region Lead at Sendmarc, commented: “The DMARC space is crowded with a lot of noise, but every now and then, you find the people who cut through it.

    I’ve had the good fortune of working alongside Dan not once, but twice – and this time, we’re doing it with the right platform and the right leadership. I’m very excited about this second chance to get it right.” 

    About Sendmarc  

    Sendmarc is a global leader in safeguarding email communications through DMARC. Built with a partner-first approach, its platform empowers MSPs and VARs to deliver trusted protection against impersonation, phishing, and other email-based threats.

    In addition to preventing fraud, Sendmarc improves email deliverability, ensuring legitimate business communications reach their intended recipients.

    Trusted by enterprises and partners worldwide, Sendmarc provides the tools and expertise needed to help customers achieve full DMARC compliance quickly and effectively. 

    Contacts

    North America Customer Success Director
    Dan Levinson
    Sendmarc
    dan.levinson@sendmarc.com

    North America Region Lead
    Rob Bowker
    Sendmarc
    rob.bowker@sendmarc.com

    The post Sendmarc appoints Dan Levinson as Customer Success Director in North America appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated cyberespionage campaign dubbed PassiveNeuron has emerged from the shadows after months of dormancy, with security researchers uncovering fresh details about its operations and attack methods. The campaign, first detected in June 2024, has resurfaced with renewed vigor, targeting government, financial and industrial organizations across Asia, Africa and Latin America with previously unknown malware […]

    The post PassiveNeuron Targets High-Profile Servers to Deploy Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Wilmington, Delaware, October 21st, 2025, CyberNewsWire Sendmarc has announced the appointment of Dan Levinson as Customer Success Director – North America, furthering the company’s regional expansion and commitment to providing expert, locally aligned support to organizations across the continent. Levinson will lead the development of customer success programs that help businesses strengthen their email security […]

    The post Sendmarc appoints Dan Levinson as Customer Success Director in North America appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CISA has issued an urgent alert about a critical server-side request forgery (SSRF) vulnerability in Oracle E-Business Suite, now actively exploited by threat actors.

    Tracked as CVE-2025-61884, the flaw affects the Runtime component of Oracle Configurator and allows remote attackers to forge requests without authentication, potentially leading to unauthorized access and data exfiltration.

    This vulnerability, rated with a high severity score under CVSS 3.1, stems from inadequate input validation that enables attackers to manipulate server requests to internal or external resources.

    As organizations rely heavily on Oracle E-Business Suite for enterprise resource planning (ERP), the risks are amplified in sectors like finance, manufacturing, and government, where sensitive data flows through these systems.

    Exploitation Tactics And Real-World Impact

    CISA’s Known Exploited Vulnerabilities (KEV) catalog added CVE-2025-61884 after evidence emerged of active exploitation in the wild.

    Attackers can leverage SSRF to scan internal networks, bypass firewalls, and interact with cloud metadata services, often as a stepping stone for broader intrusions.

    While direct ties to ransomware campaigns remain unconfirmed, security researchers note similarities to tactics used in recent supply chain attacks, where SSRF flaws have facilitated lateral movement.

    Oracle patched the issue in its October 2025 Critical Patch Update, but unpatched systems remain prime targets.

    Early reports indicate exploitation attempts targeting outdated E-Business Suite installations in the Asia-Pacific regions, with potential for widespread compromise if organizations delay remediation.

    The flaw aligns with CWE-918, a common SSRF weakness that has plagued enterprise software for years.

    Mitigations

    CISA urges immediate action: apply Oracle’s vendor-provided patches or mitigations, such as network segmentation and web application firewalls (WAFs) tuned to block anomalous requests.

    For cloud-hosted instances, adhere to Binding Operational Directive (BOD) 22-01, which mandates vulnerability management in federal systems.

    If mitigations prove infeasible, CISA advises discontinuing use of affected products to avoid exposure. Experts emphasize proactive monitoring, including logging SSRF indicators like unexpected outbound traffic.

    Organizations should scan their networks for vulnerabilities using tools like Nessus or OpenVAS and review access logs for signs of exploitation.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post CISA Warns Of Oracle E-Business Suite SSRF Vulnerability Actively Exploited In Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Luma Infostealer, a malware-as-a-service (MaaS) offering, has emerged as a potent threat targeting high-value credentials such as web browser cookies, cryptocurrency wallets, and VPN/RDP account information. Beyond isolated theft, threat actors are employing Luma in the initial infiltration stages of complex campaigns—ransomware deployment, account hijacking, and internal network compromise. The stolen data fuels identity theft, […]

    The post New Luma Infostealer Malware Steals Browser Data, Cryptocurrency, and Remote Access Accounts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Understanding exactly how users authenticate to cloud services is crucial for effective security monitoring. A recently refined bitfield mapping technique decodes the opaque UserAuthenticationMethod values in Microsoft 365 audit logs, transforming numeric codes into actionable, human-readable descriptions. This breakthrough empowers incident responders to identify primary authentication methods even when only Microsoft 365 audit logs are […]

    The post Decoding Microsoft 365 Audit Logs Using Bitfield Mapping: An Investigation Report appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Apache Syncope, has disclosed a critical security vulnerability that allows authenticated administrators to execute arbitrary code on affected systems. The flaw, tracked as CVE-2025-57738, impacts all Apache Syncope versions 3.x before 3.0.14 and 4.x before 4.0.2, exposing organisations to potential system compromise through malicious Groovy code injection.​ Vulnerability Details and Attack Mechanism The vulnerability exists […]

    The post Apache Syncope Groovy Flaw Allows Remote Code Injection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶