• Thread Author
A man in a suit interacts with holographic screens featuring code and robotic arms, indicating advanced technology or AI control.
Here is a concise and professional edit and summary for the article "Zenity Labs Exposes Widespread 'AgentFlayer' Vulnerabilities Allowing Silent Hijacking of Major Enterprise AI Agents Circumventing Human Oversight" from CNHI News:

Zenity Labs Uncovers Major 'AgentFlayer' Vulnerabilities, Enabling Silent Hijacking of Leading Enterprise AI Agents
LAS VEGAS, Aug. 6, 2025
– At Black Hat USA 2025, Zenity Labs unveiled AgentFlayer, a series of zero-click exploit chains that allow attackers to silently compromise enterprise AI agents and assistants, bypassing all human oversight. The research, led by Zenity co-founder and CTO Michael Bargury and threat researcher Tamir Ishay Sharbat, demonstrates with real-world exploits how AI agents from OpenAI, Microsoft, Salesforce, Google, and others can be surreptitiously hijacked to exfiltrate data, manipulate workflows, and act autonomously within enterprise systems.
Key Findings:
  • OpenAI ChatGPT: Successfully compromised through email-driven prompt injection, enabling malicious memory persistence and full account compromise—including connected Google Drive accounts.
  • Microsoft Copilot Studio: Over 3,000 public-facing agents were found leaking internal tools; customer support agents could inadvertently expose entire CRM databases.
  • Salesforce Einstein: Attackers could reroute all customer communications to attacker-controlled emails by manipulating case creation.
  • Google Gemini and Microsoft 365 Copilot: These agents were exploited to exfiltrate sensitive conversations and social engineer users via booby-trapped calendar invites and emails.
  • Cursor with Jira MCP: Weaponized ticket workflows were used to harvest developer credentials.
“These aren’t theoretical issues—these are live exploits with immediate consequences,” said Michael Bargury, CTO of Zenity, noting attackers can persistently commandeer AI agents, exfiltrate sensitive data, impersonate users, and cross enterprise boundaries undetected.
Industry Response:
While OpenAI and Microsoft issued patches after Zenity’s responsible disclosures, several other vendors declined to address the reported vulnerabilities, claiming the issues reflected “intended functionality.” Zenity warns that current enterprise AI deployments rely too heavily on vendor mitigations and legacy security tooling, leaving organizations open to a new class of fully automated, zero-interaction attacks.
Next Steps and Recommendations:
Zenity Labs is releasing full technical details and defense guidance at labs.zenity.io, urging organizations to adopt agent-centric visibility and control. Live demonstrations and further consultation will be available at Zenity's Black Hat booth #5108 and at the upcoming AI Agent Security Summit 2025 in San Francisco.
About Zenity and Zenity Labs:
Zenity delivers agent-centric security and governance for enterprise AI. Zenity Labs serves as its research arm, uncovering, simulating, and disclosing emerging threats to promote a secure AI ecosystem.
Media Contact:
Diana Diaz, Force4 Technology Communications
diana.diaz@force4.co
For more information and the original multimedia content, visit: PR Newswire Release

Edits made for clarity, conciseness, and news value. For deep technical dives or specific recommendations, see the Zenity Labs release site.

Source: cnhinews.com Zenity Labs Exposes Widespread "AgentFlayer" Vulnerabilities Allowing Silent Hijacking of Major Enterprise AI Agents Circumventing Human Oversight
 

Back
Top