The list below includes the top cybersecurity news stories you need to know about from the past 24 hours. Subscribe for daily news updates on the most important stories!
SmartAttack: New Threat Exposes Air-Gapped Data via Smartwatches
An innovative attack method known as SmartAttack leverages smartwatches to capture data from air-gapped systems using ultrasonic signals.
Key Points:
SmartAttack utilizes smartwatches to exfiltrate data from isolated systems.
The attack requires prior infiltration and malware installation on the victim's device.
Ultrasonic signals capture keystrokes and other sensitive information undetectably.
A recent breakthrough in cybersecurity has revealed a technique called SmartAttack, developed by researchers at Ben-Gurion University of the Negev. This method exploits the capabilities of smartwatches to steal sensitive information from air-gapped systems—environments designed to be isolated from the internet for enhanced security. With smartwatches increasingly common in high-security locations, they present a new vulnerability. Using the built-in microphones of these devices, malicious actors can capture ultrasonic signals that carry illicit information via inaudible frequencies, effectively bypassing traditional security measures.
For an attacker to successfully execute this scheme, they first need to compromise the target's air-gapped computer, embedding stealthy malware that converts sensitive data like keystrokes or credentials into ultrasonic signals. Once this information is transmitted through the computer’s speakers, the smartwatch in proximity can pick it up, decode it, and send it back to the attacker through features like Bluetooth or Wi-Fi. This highlights a stark reality: while air-gapped systems are typically viewed as secure, they are increasingly susceptible to clever covert channels, necessitating urgent discussions on effective mitigations.
Learn More: Security Week
EchoLeak AI Attack Exposes Microsoft 365 Copilot Vulnerabilities
A serious vulnerability in Microsoft 365 Copilot could have allowed attackers to exfiltrate sensitive data through a zero-click attack.
Key Points:
Microsoft recently patched a critical vulnerability in Copilot (CVE-2025-32711).
The EchoLeak attack enables data theft without user interaction, via specially crafted emails.
Attackers can exploit Copilot to access sensitive information from previous conversations.
Microsoft advises no customer action is needed following the server-side patch.
This technique may also affect other AI applications beyond Microsoft.
Microsoft 365 Copilot, designed to assist users in applications like Word and Outlook, was found vulnerable to an innovative attack known as EchoLeak. Conducted through zero-click methods, this attack leverages a vulnerability tracked as CVE-2025-32711, which allowed attackers to send cleverly crafted emails that instructed Copilot to gather sensitive data without any interaction from the user. Essentially, when a targeted individual referenced topics from the malicious email, Copilot complied and unwittingly sent confidential information to the attacker's server.
The implications of this vulnerability are significant. In an environment where AI tools are increasingly integrated into daily tasks, the potential for exploitation presents a threat not only to individual users but also to organizations at large. Although Microsoft has assured customers that they have implemented necessary patches, the nature of this attack raises questions about the security measures that AI platforms must adopt. With attackers bypassing existing security mechanisms, including cross-prompt injection protections, the need for robust safeguards remains crucial in mitigating risks associated with AI applications.
Learn More: Security Week
Google, AWS, Cloudflare Experience Major Service Outage
A significant outage has impacted several major web services, leaving businesses and users struggling to access critical applications.
Key Points:
Google, AWS, and Cloudflare report widespread disruptions.
Users are experiencing difficulties with applications relying on these services.
The outage highlights vulnerabilities in cloud infrastructures.
In a notable incident, users around the globe faced disruptions as major tech giants Google, Amazon Web Services (AWS), and Cloudflare experienced a widespread outage. This situation left businesses and consumers grappling with access to critical applications and services that heavily depend on these platforms. Organizations reliant on these cloud services reported delays and failures, impacting productivity and customer experiences across numerous sectors.
The ramifications of such outages extend beyond mere inconvenience. They serve as a harsh reminder of the vulnerabilities inherent in cloud infrastructure, where many organizations place their trust in the seamlessness of technology. When key players in the space encounter difficulties, it raises questions about overall dependence on a few dominant providers for indispensable services. With the increasing shift towards cloud data management and business operations, incidents like this underline the necessity for companies to develop contingency plans and consider diverse solutions to mitigate the risks associated with service outages.
Learn More: Slashdot
Help Get the News Out! Share This Post.
Help us get the word out about the most important cybersecurity stories. Share this post on your Substack, Reddit, X / Twitter, via email, or even carrier pigeon. Help your friends, family and contacts stay safe & informed!