Home » security » Page 14
ChatGPT browsing window with a blurred results pane, a visible MFA prompt, and a warning about “q=” links and allowlisted redirects

ChatGPT Data Leaks: Seven New Prompt Injection Paths and Real

Seven fresh techniques let attackers leak ChatGPT data through everyday workflows: poisoned search, “q=” one-click links, allowlisted ad redirects, conversation injection, markdown hiding, and memory poisoning. Because exposure rides on normal browsing and memory behavior, prevention requires policy plus proof: sanitize URLs, block bing.com/ck/a, disable Saved Memory for high-risk roles, and validate controls continuously with OWASP LLM Top 10 and MITRE ATLAS as your benchmarks.

Read More
Iran-aligned phishing campaign targeting US policy experts via prefilled Microsoft 365 portals and RMM persistence

Iran-Linked Phishing Hits US Policy Experts with M365 and RMM

Iran-aligned operators ran a precise phishing campaign against US policy experts. They impersonated scholars, redirected victims to prefilled Microsoft 365 pages, and, when blocked, installed remote-access tools. The goal: long-term visibility into policy drafts, research, and contacts—achieved through identity abuse, inbox rules, and pragmatic persistence.

Read More
A conceptual image of a Microsoft 365 firewall blocking a malicious red email representing a BEC attack, while allowing safe emails to pass through, symbolizing effective security rules

Block BEC: 9 Microsoft 365 Rules That Actually Work

Business email compromise drains budgets with executive spoofing and invoice fraud. This practical Microsoft 365 guide shows nine rules that actually stop BEC: tuned anti-phish and impersonation, Safe Links and Safe Attachments, SPF/DKIM/DMARC, phishing-resistant MFA with Conditional Access, external sender tags, mailbox hygiene, attack simulation, and a short incident playbook.

Read More