Critical AI vulnerability EchoLeak exposed in Microsoft 365 Copilot! Learn about the zero-click attack and its implications. #DataExfiltration #AI #Cybersecurity https://redoracle.com/News/AI-Data-Leaks-EchoLeak-Vulnerability-Exposed.html
AI Data Leaks EchoLeak Vulnerability Exposed

Image Introduction A critical vulnerability known as EchoLeak has been identified in Microsoft 365 Copilot, allowing unauthorized data exfiltration without user interaction. Thi...

RedOracle

Your smartwatch could be spying on you! A new cyberattack uses ultrasonic signals to steal dataβ€”even from isolated systems. How safe are your gadgets?

https://thedefendopsdiaries.com/smartattack-how-smartwatches-are-changing-the-game-in-cybersecurity/

#smartattack
#cybersecurity
#dataexfiltration
#smartwatches
#airgappedsystems

SmartAttack: How Smartwatches Are Changing the Game in Cybersecurity

Explore how SmartAttack uses smartwatches to breach air-gapped systems, revealing new cybersecurity vulnerabilities.

The DefendOps Diaries

EchoLeak – 0-Click AI Vulnerability Enabling Data Exfiltration from 365 Copilot

https://www.aim.security/lp/aim-labs-echoleak-blogpost

#HackerNews #EchoLeak #AI #Vulnerability #DataExfiltration #365Copilot #Cybersecurity

Aim Labs | Echoleak Blogpost

The first weaponizable zero-click attack chain on an AI agent, resulting in the complete compromise of Copilot data integrity

Hunting with Elastic Security: Exfiltration over C2 channel: https://www.elastic.co/blog/security-exfiltration

#threathunting #dataexfiltration

Exfiltration over C2 channel

Attackers use C2 channels to stealthily exfiltrate data, blending it with normal network traffic. This blog explores how to detect T1041 - Exfiltration Over C2 Channel using Elastic’s ES|QL queries, u...

Elastic Blog

πŸ”Ž MisCloud is just retired! Walkthrough disclosure - right from the clouds πŸ˜Άβ€πŸŒ«οΈ

πŸ”Έ Google Cloud Services logs
πŸ”Έ Intense PCAP analysis
πŸ”Έ Really nice real-life scenario

πŸ”— https://blog.cyberethical.me/htb-sherlock-miscloud

Want to try investigations yourself?

πŸ”— https://blog.cyberethical.me/go-htbapp

#CyberEthical #HackTheBox #forensics #EthicalHacking #blueteaming #itsec #dataexfiltration #googlecloudservices #gcs #pcap #wireshark

Pyrzout :vm: (@jos1264@social.skynetcloud.site)

Open-source malware doubles, data exfiltration attacks dominate https://www.helpnetsecurity.com/2025/04/03/open-source-malware-index-q1-2025/ #Dataexfiltration #cybercrime #opensource #Don'tmiss #Sonatype #malware #report #News

SkynetCloud

πŸ’£ Full write-up for "Tales for the Brave" - this year's Hard forensics challenge from Hack The Box Cyber Apocalypse CTF - Tales From Eldoria.

πŸ”Έ Code #deobfuscation
πŸ”Έ hashtag#Telegram data exfiltration
πŸ”Έ Malware behavioral analysis

πŸ”— https://blog.cyberethical.me/htb-ctf-2025-forensics-tales-for-the-brave

#CyberEthical #CyberApocalypse25 #HackTheBox #forensics #EthicalHacking #blueteaming #itsec #dataexfiltration #malware

πŸ’£ Full write-up for ToolPie this year's forensics challenge from Hack The Box Cyber Apocalypse CTF - Tales From Eldoria.

πŸ”Έ PCAP (network capture) analysis
πŸ”Έ Python bytecode, marshalling, decompiling

πŸ”— https://blog.cyberethical.me/htb-ctf-2025-forensics-toolpie

#CyberEthical #CyberApocalypse25 #HackTheBox #forensics #python #pcap #wireshark #EthicalHacking #blueteaming #itsec #dataexfiltration

@mwdawson Yeah, just like #CloudAct demands from anyone residing within the #USA, conducting business in the USA or having a parent/subsidiary operating in the #US.

Something #GAFAMs work hard to let people do: KEEP #selfCustody of their data!

Cybersecurity researchers have uncovered two malicious packages, zebo and cometlogger, on the Python Package Index (PyPI) that exfiltrate sensitive data from compromised systems! 🚨 With over 280 downloads before removal, these packages employ advanced techniques for surveillance and credential theft. Always verify code before running! πŸ”πŸ’» #Cybersecurity #Malware #Python #DataExfiltration #Fortinet #newz

https://thehackernews.com/2024/12/researchers-uncover-pypi-packages.html

Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts

PyPI packages "Zebo" and "Cometlogger" downloaded 280+ times, exfiltrate data with obfuscation and anti-detection.

The Hacker News