Your Copilot data can be hijacked with a single click - here's how

Latest news

Overview

A recently discovered vulnerability known as Reprompt poses a significant risk to users of Copilot, a popular AI-powered tool. This flaw allows attackers to gain control over the Copilot interface and access sensitive user data, even after the chat session has ended. The implications of this vulnerability are serious, as it can potentially expose personal information and compromise user privacy. Users of Copilot should be aware of this issue and take necessary precautions to protect their data. Security experts recommend monitoring for any suspicious activity related to Copilot accounts until a fix is implemented.

Key Takeaways

  • Affected Systems: Copilot, Microsoft products utilizing Copilot features
  • Action Required: Users should avoid clicking on suspicious links and monitor their accounts for unusual activity.
  • Timeline: Newly disclosed

Original Article Summary

The Reprompt vulnerability lets attackers control Copilot and pull your data, even after you close the chat.

Impact

Copilot, Microsoft products utilizing Copilot features

Exploitation Status

The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.

Timeline

Newly disclosed

Remediation

Users should avoid clicking on suspicious links and monitor their accounts for unusual activity. Further details on specific patches or updates have not been provided.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Vulnerability.

Related Coverage

Report: FTP protocol security gaps expose millions of systems

SCM feed for Latest

A recent report indicates that approximately half of the 6 million internet-connected systems using the outdated File Transfer Protocol (FTP) are not secured with encryption. This lack of encryption makes these systems particularly vulnerable to cyberattacks, as attackers can easily intercept sensitive data during file transfers. The findings, reported by SecurityWeek, raise concerns for organizations relying on FTP for data transfer, as they may unwittingly expose critical information to cybercriminals. Given the prevalence of FTP usage, the implications of these security gaps could be widespread, impacting various industries. Companies should prioritize upgrading to more secure file transfer methods to protect their data from potential breaches.

Apr 21, 2026

Several flaws found in serial-to-IP converters used in critical sectors

SCM feed for Latest

Forescout Technologies has discovered 20 security vulnerabilities in Sliex and Lantronix serial-to-IP converters, commonly used in sectors like healthcare and operational technology. These vulnerabilities can be exploited without any authentication, meaning attackers could potentially gain remote access to critical systems. This is a serious concern, as these converters play a vital role in enabling communication between devices. The exposure could lead to unauthorized control or data breaches, impacting patient care and industrial operations. Organizations relying on these devices need to take immediate action to protect their systems from potential attacks.

Apr 21, 2026

Lawmakers ponder terrorism designations, homicide charges over hospital ransomware attacks

CyberScoop

During a recent House Homeland Security Committee hearing, lawmakers discussed the rising issue of ransomware attacks targeting hospitals. These attacks have significant implications for patient care and safety, leading to concerns that they may warrant designations as terrorism or even homicide charges against perpetrators. The discussions reflect growing frustration over the frequency and severity of these attacks, which not only disrupt healthcare services but can also endanger lives. As ransomware incidents increase, lawmakers are considering more serious legal consequences to deter future attacks and protect vulnerable healthcare systems from cybercriminals. This initiative highlights the urgent need for stronger cybersecurity measures in the healthcare sector.

Apr 21, 2026

New Lotus data wiper used against Venezuelan energy, utility firms

BleepingComputer

Researchers have identified a new type of data-wiping malware called Lotus, which was used in targeted attacks against energy and utility companies in Venezuela last year. This malware is particularly concerning as it specifically targets critical infrastructure, potentially disrupting essential services. The attacks indicate a growing trend of cyber threats aimed at destabilizing operations in the energy sector, which can have far-reaching consequences for both companies and the general public. Organizations in similar sectors should be vigilant and enhance their cybersecurity measures to protect against such threats. The emergence of Lotus highlights the ongoing risks faced by utilities worldwide.

Apr 21, 2026

North Korea’s Lazarus APT stole $290M from Kelp DAO

Security Affairs

The Lazarus Group, a hacking group linked to North Korea, successfully stole $290 million from Kelp DAO, a decentralized finance protocol on the Ethereum network. The theft was facilitated by exploiting vulnerabilities in LayerZero, a cross-chain messaging protocol. A subsequent attempt to steal an additional $95 million was thwarted by security measures. This incident raises significant concerns about the security of DeFi protocols and highlights the ongoing risks posed by state-sponsored cybercriminals in the cryptocurrency space. The implications are serious for investors and users of decentralized finance, as such breaches can undermine trust in these platforms.

Apr 21, 2026

Sysdig report signals end of human-led cloud defense

SCM feed for Latest

Loris Degioanni, the founder and CTO of Sysdig, announced that many organizations are moving away from traditional human-led cloud security measures. According to recent data, over 70% of security teams are now using behavior-based runtime detection methods to secure their cloud environments. This shift indicates a growing reliance on automated systems to identify and respond to security threats. As cloud infrastructures become more complex, the need for real-time, automated responses is becoming critical. This change could significantly impact how companies manage security and protect their digital assets moving forward.

Apr 21, 2026