Microsoft has quietly tightened one of the most consequential guardrails for enterprise AI: Microsoft Purview’s Data Loss Prevention (DLP) policies that block Microsoft 365 Copilot processing of sensitivity‑labeled files will now apply to Word, Excel, and PowerPoint files regardless of where...
Microsoft’s flagship productivity assistant, Microsoft 365 Copilot Chat, briefly read and summarized emails that organizations had explicitly labeled “Confidential,” exposing a gap between automated AI convenience and long‑standing enterprise access controls...
confidential data exposure
copilotcopilot bug
copilotsecurity
data governance
data loss prevention
dlp policies
enterprise governance
enterprise risk management
enterprise security
microsoft 365 copilot
microsoft copilotsecurity governance
sensitivity labels
Microsoft’s flagship productivity AI for Microsoft 365 has a glaring privacy problem: for weeks a code error allowed Copilot Chat to read and summarize emails that organizations had explicitly labelled as confidential, bypassing Data Loss Prevention (DLP) controls and undermining a core tenant...
Microsoft’s Copilot rollout has delivered a leap in workplace productivity—and with it, a fresh class of security risk that is only visible when the assistant is actually running. Recent disclosures and vendor analyses show a practical, repeatable pattern: configuration hardening, identity...
Microsoft’s recent changes have finally untangled one of Windows 11’s most persistent irritations: setting a third‑party browser as the operating system’s default is now far less painful than it was at launch, and regulatory pressure in Europe has pushed the company even further toward...
ai memory poisoning
ai safety
amd drivers
copilotsecurity
data exfiltration
deep link attack
default browser
driver security
edge rivalry
enterprise security
european dma
official sources
prompt injection
security research
windows 11
windows 7
Token Security’s latest week of communications sharpened a single, urgent message: as enterprises rapidly adopt AI copilots and autonomous agents, identity — not just models or data — is the primary attack surface that must be discovered, governed and controlled. The company reinforced that...
Microsoft's public promise to "fix Windows 11" this year is not a marketing flourish — it's a direct response to hard, visible pain across the platform, and the company is now mobilizing a formal "swarming" effort to address the problems users and testers have been raising. Pavan Davuluri, who...
Security researchers have shown that a single, seemingly legitimate Copilot link could be turned into a stealthy data‑exfiltration pipeline — an attack chain the research community has labeled “Reprompt” — and the discovery raises urgent questions for anyone who uses Microsoft Copilot Personal...
Microsoft’s January 2026 month of news landed as a high‑impact mix of emergency Windows patches, several high‑profile security discoveries, cloud migration deadlines and product surface realignments — a short, sharp reminder of how quickly platform changes can ripple through enterprises and...
Security researchers have shown that a single, innocuous-looking Copilot link can be weaponized to hijack an authenticated Copilot Personal session and quietly siphon data — a vulnerability the research community labeled “Reprompt” — and Microsoft moved to mitigate the specific vector in its...
A deceptively small convenience — a Copilot deep link that pre-fills your assistant’s prompt — has been weaponized into a one-click data-exfiltration technique researchers call Reprompt, demonstrating how AI assistants with access and memory can become a silent conduit for sensitive information...
Security researchers have discovered a deceptively simple but dangerous exploit that could turn a single click on a legitimate Microsoft Copilot link into a live data‑exfiltration pipeline — a vulnerability the research community has labeled “Reprompt,” and one that Microsoft moved to mitigate...
A critical weakness in Microsoft Copilot Personal allowed attackers to turn a single, legitimate click into a stealthy exfiltration channel that could siphon profile attributes, file summaries and conversational memory — a chained prompt‑injection attack Varonis Threat Labs labeled “Reprompt”...
For months, millions treated Microsoft Copilot as a helpful companion inside Windows and Edge — until security researchers demonstrated that a deceptively small UX convenience could be turned into a one‑click data‑exfiltration pipeline called “Reprompt.”
Background / overview
Varonis Threat Labs...
A deceptively small UX convenience — allowing Copilot to accept a prefilled prompt from a URL — has been chained into a practical, one‑click data‑exfiltration technique that security researchers call Reprompt, while at the same time enterprise telemetry shows ChatGPT accounts for the lion’s...
Microsoft’s Copilot ecosystem was rattled in mid‑January when security researchers disclosed a novel, one‑click exfiltration technique — dubbed “Reprompt” — that used Copilot deep‑links and conversational behaviors to siphon user profile data, file summaries and chat memory from authenticated...
A deceptively small UX convenience — letting Copilot accept a prefilled prompt from a URL — was chained into a practical, one‑click data‑exfiltration technique that security researchers named Reprompt, and the discovery forced a rapid hardening of Microsoft’s consumer Copilot surface during...
A deceptively small UX convenience—allowing Microsoft Copilot to accept a prefilled prompt from a URL—was chained into a practical, one‑click data‑exfiltration technique that targeted Copilot Personal and, until Microsoft pushed mitigations in mid‑January 2026, could quietly siphon profile...
Varonis Threat Labs’ proof‑of‑concept shows that a deceptively small convenience — allowing Microsoft Copilot to accept a prefilled prompt from a URL — could be chained into a practical, one‑click data‑exfiltration technique that targeted Copilot Personal and could, under lab conditions, siphon...
A skirmish of culture, security and policy is playing out across the Windows ecosystem this week — a prankish browser extension that renames Microsoft to “Microslop,” a technically sophisticated one‑click Copilot exploit researchers call Reprompt, and Microsoft’s public push to expand free AI...