Tag: data breach
- 
		
		
		The Register: Microsoft stays mum about M365 Copilot on-demand security bypassSource URL: https://www.theregister.com/2025/08/20/microsoft_mum_about_m365_copilot/ Source: The Register Title: Microsoft stays mum about M365 Copilot on-demand security bypass Feedly Summary: Redmond doesn’t bother informing customers about some security fixes Microsoft has chosen not to tell customers about a recently patched vulnerability in M365 Copilot.… AI Summary and Description: Yes Summary: The text highlights a concerning practice by… 
- 
		
		
		The Register: Italian hotels breached en masse since June, government confirmsSource URL: https://www.theregister.com/2025/08/14/italian_hotels_breached_en_masse/ Source: The Register Title: Italian hotels breached en masse since June, government confirms Feedly Summary: Nearly 100,000 records allegedly up for sale after apparent breach at booking system Italy’s digital agency (AGID) says a cybercriminal’s claims concerning a spate of data thefts affecting various hotels across the country are genuine.… AI Summary… 
- 
		
		
		The Register: Ransomware crew spills Saint Paul’s 43GB of secrets after city refuses to cough up cashSource URL: https://www.theregister.com/2025/08/13/ransomware_crew_spills_saint_pauls/ Source: The Register Title: Ransomware crew spills Saint Paul’s 43GB of secrets after city refuses to cough up cash Feedly Summary: Minnesota’s capital is the latest to feature on Interlock’s leak blog after late-July cyberattack The Interlock ransomware gang has flaunted a 43GB haul of files allegedly stolen from the city of… 
- 
		
		
		Embrace The Red: Claude Code: Data Exfiltration with DNS RequestsSource URL: https://embracethered.com/blog/posts/2025/claude-code-exfiltration-via-dns-requests/ Source: Embrace The Red Title: Claude Code: Data Exfiltration with DNS Requests Feedly Summary: Today we cover Claude Code and a high severity vulnerability that Anthropic fixed in early June. The vulnerability allowed an attacker to hijack Claude Code via indirect prompt injection and leak sensitive information from the developer’s machine, e.g.…