
Reprompt Attack Exposes Data via Microsoft Copilot Sessions
A newly disclosed exploit known as Reprompt leverages Copilot session hijacking to inject attacker-controlled prompts via URLs. CISOs should assess Copilot exposure risks now.
Phishing remains the most common initial access vector in cyber attacks. This section covers the latest phishing campaigns, business email compromise incidents, credential harvesting operations, and emerging social engineering techniques targeting organizations worldwide.
18 articles

A newly disclosed exploit known as Reprompt leverages Copilot session hijacking to inject attacker-controlled prompts via URLs. CISOs should assess Copilot exposure risks now.

A recent surge in Instagram password reset emails coincided with a leak of 17M user records. CISOs must act fast to assess data exposure and social engineering risk.

Click-through rates misrepresent email risk. CISOs should pivot to containment metrics that better reflect modern phishing response and breach limitations.

Microsoft has uncovered a phishing threat using complex routing and DNS misconfigurations to spoof trusted domains. CISOs must update defenses.

Chinese-language darknet markets on Telegram are enabling massive-scale cybercrime, with $2B/month in illicit activity. Here's what CISOs need to know.

A global surge in LinkedIn job scams exposes enterprise attack surfaces. CISOs must understand phishing risks tied to fraudulent job offers and insider fraud.

New Kaspersky findings reveal shifts in industrial malware activity in Q3 2025. CISOs must address growing OT threat diversity and regional variances.

Operation Sentinel led to 574 arrests in 19 African nations, crippling cybercrime networks behind BEC, ransomware, and digital fraud. CISOs must understand the regional and global implications.
Browse the latest cybersecurity incidents and threat intelligence by topic.
Threat intelligence is the foundation of proactive cybersecurity defense.
View ArticlesArtificial intelligence is reshaping both offensive and defensive cybersecurity.
View ArticlesRansomware attacks continue to be one of the most disruptive cyber threats facing organizations worldwide.
View ArticlesZero-day vulnerabilities represent the most dangerous class of security flaws because no patches exist at the time of discovery.
View ArticlesAs organizations accelerate cloud adoption, new attack surfaces emerge across AWS, Azure, Google Cloud, and SaaS platforms.
View ArticlesData breaches expose sensitive information and erode customer trust.
View ArticlesMalware continues to evolve with increasingly sophisticated evasion techniques and delivery mechanisms.
View ArticlesEffective vulnerability management is critical for reducing organizational risk.
View Articles