Skip to main content
See every side of every news story
Published loading...Updated

A Single Click Mounted a Covert, Multistage Attack Against Copilot

Varonis revealed that Reprompt exploits authenticated Copilot Personal sessions to stealthily exfiltrate data via chained requests, with Microsoft patching the vulnerability in January 2026.

Summary by Ars Technica
Microsoft has fixed a vulnerability in its Copilot AI assistant that allowed hackers to pluck a host of sensitive user data with a single click on a legitimate URL. The hackers in this case were white-hat researchers from security firm Varonis. The net effect of their multistage attack was that they exfiltrated data, including the target’s name, location, and details of specific events from the user’s Copilot chat history. The attack continued t…

9 Articles

Center

Researchers have uncovered a new attack method that can be performed with one click and bypasses Microsoft Copilot security controls, allowing for the unauthorized capture of user data.

·United States
Read Full Article

A new threat is emerging for Windows. Researchers at Varonis have discovered a new security vulnerability in Microsoft Copilot. It allows attackers to siphon your data without your knowledge…

Read Full Article
Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center

Factuality Info Icon

To view factuality data please Upgrade to Premium

Ownership

Info Icon

To view ownership data please Upgrade to Vantage

BleepingComputer broke the news in on Wednesday, January 14, 2026.
Too Big Arrow Icon
Sources are mostly out of (0)

Similar News Topics

News
Feed Dots Icon
For You
Search Icon
Search
Blindspot LogoBlindspotLocal