Zenity’s expanded integration with Microsoft Copilot Studio promises to bring native, inline attack prevention into the execution path of enterprise AI agents, positioning runtime enforcement and step-level policy controls as the new baseline for safe agent deployment at scale.
Background /...
Zenity’s expanded partnership with Microsoft plugs real-time, inline security directly into Microsoft Copilot Studio agents — a move that promises to make agentic AI safer for widespread enterprise use while raising new operational and architectural questions for security teams. The...
Microsoft’s Copilot for Microsoft 365 was supposed to make AI agents safer to run at enterprise scale; instead, recent reports show a control-plane failure that left some agents discoverable and installable despite tenant-level policy locks—forcing administrators into time-consuming, per-agent...
Microsoft quietly patched a vulnerability in Microsoft 365 Copilot that allowed the assistant to read and summarize enterprise files without producing the expected Purview audit entry — a gap that, if exploited, could let insiders or attackers extract sensitive data while leaving no trace in...
A security researcher’s routine Copilot query revealed a startling blind spot in Microsoft’s logging: under certain prompts, Copilot could return file summaries without leaving the expected Purview audit entry — and, according to the researcher, Microsoft quietly rolled out a fix without issuing...
Microsoft’s Copilot may have closed an eye‑catching zero‑click hole, but a quieter — and arguably more dangerous — problem has been bubbling under the surface: Copilot and related AI components are not reliably creating the audit trails organizations depend on for compliance and forensics. That...
Popular generative‑AI browser assistants can and do sweep up deeply personal data from ordinary web sessions — including health records, bank details and even social‑security numbers — and forward that content to remote servers where it can be tracked, profiled and reused in ways most users...
Zenity Labs’ Black Hat presentation unveiled a dramatic new class of threats to enterprise AI: “zero‑click” hijacking techniques that can silently compromise widely used agents and assistants — from ChatGPT to Microsoft Copilot, Salesforce Einstein, and Google Gemini — allowing attackers to...
AVEVA's PI Integrator for Business Analytics has been the subject of a coordinated security disclosure that identifies two authenticated, yet remotely exploitable, vulnerabilities which could permit file upload of dangerous types and the disclosure of sensitive output data — issues that demand...
aveva pi integrator
cisa icsa-25-224-04
credential leakage
critical infrastructure
cve-2025-41415
cve-2025-54460
dangerous file types
dataexfiltration
hdfs targets
ics security
insertion of sensitive information
network segmentation
ot security
patch management
pi integrator for business analytics
sensitive data
text file targets
unrestricted file upload
wdac allowlisting
Zenity Labs’ Black Hat presentation laid bare a worrying new reality: widely used AI agents and custom assistants can be silently hijacked through zero-click prompt-injection chains that exfiltrate data, corrupt agent “memory,” and turn trusted automation into persistent insider threats...
Here is a concise and professional edit and summary for the article "Zenity Labs Exposes Widespread 'AgentFlayer' Vulnerabilities Allowing Silent Hijacking of Major Enterprise AI Agents Circumventing Human Oversight" from CNHI News:
Zenity Labs Uncovers Major 'AgentFlayer' Vulnerabilities...
agentflayer
ai autonomous threats
ai governance
ai hijacking
ai security
ai threat landscape
ai vulnerabilities
black hat 2025
cyber defense
cyber threats
cybersecurity
dataexfiltration
enterprise ai
enterprise security
security breach
security research
tech disclosures
threat detection
zero-click attack
A seismic shift has rocked the enterprise AI landscape as Zenity Labs' latest research unveils a wave of vulnerabilities affecting the industry's most prolific artificial intelligence agents. Ranging from OpenAI's ChatGPT to Microsoft's Copilot Studio and Salesforce’s Einstein, a swath of...
ai
ai risks
ai security
ai vulnerabilities
attack surface
automated threats
black hat 2025
cybersecurity
dataexfiltration
enterprise ai
incident response
prompt injection
security best practices
security updates
threat detection
workflow hijacking
zenity labs
zero-click attack
Large language models are propelling a new era in digital productivity, transforming everything from enterprise applications to personal assistants such as Microsoft Copilot. Yet as enterprises and end-users rapidly embrace LLM-based systems, a distinctive form of adversarial risk—indirect...
adversarial attacks
ai ethics
ai governance
ai in defense
ai security
ai vulnerabilities
cybersecurity
dataexfiltration
generative ai
large language models
llm safety
microsoft copilot
openai
prompt engineering
prompt injection
prompt shields
robustness
security best practices
threat detection
Microsoft’s SharePoint platform has long been regarded as an indispensable piece of enterprise infrastructure, relied upon by thousands of government agencies, universities, and businesses worldwide to facilitate collaboration, document management, and internal communications. Yet news broke...
In a rapidly evolving threat landscape, where industrial control systems and infrastructure software are prime targets, the security of device management platforms is more critical than ever. Newly disclosed vulnerabilities in widely used applications can lead to devastating chain reactions — a...
Microsoft has recently issued an urgent alert regarding active cyberattacks targeting on-premises SharePoint servers, a critical platform for document sharing and collaboration within organizations. These attacks exploit a previously unknown "zero-day" vulnerability, designated as...
Britain’s cybersecurity landscape is once again in sharp focus after confirmation that the UK’s National Cyber Security Centre (NCSC) has detected a “limited number” of domestic victims in the recent Microsoft hack campaign. While not on the scale of some prior, sweeping incidents, the attack...
The UK's National Cyber Security Centre (NCSC) has recently disclosed a sophisticated cyber-espionage campaign orchestrated by the Russian state-sponsored group APT28, also known as Fancy Bear. This campaign employs a malware strain dubbed "Authentic Antics" to infiltrate Microsoft 365 accounts...
The UK National Cyber Security Centre (NCSC) has formally attributed the 'Authentic Antics' malware attacks to APT28, also known as Fancy Bear, a threat actor linked to Russia's military intelligence service (GRU). This sophisticated malware campaign targets Microsoft 365 users, aiming to steal...
Recent revelations surrounding a critical Local File Inclusion (LFI) vulnerability in Microsoft 365’s Export to PDF functionality have cast an intense spotlight on the hidden complexities and lingering security risks inherent even in feature-rich, enterprise-grade cloud platforms. The...
api exploitation
api security
cloud security
cyber threats
cybersecurity
dataexfiltration
enterprise security
file inclusion attack
graph api
html conversion vulnerability
lfi
local file inclusion
microsoft 365
pdf export
saas risks
saas security
security best practices
security patch
security research
vulnerability