How a simple link allowed hackers to bypass Copilot's security guardrails - and what Microsoft did about it
- Jan 19
- 1 min read

On Wednesday, Varonis Threat Labs published new research documenting Reprompt, a new attack method that affected Microsoft's Copilot AI assistant.
Reprompt impacted Microsoft Copilot Personal and, according to the team, gave "threat actors an invisible entry point to perform a data‑exfiltration chain that bypasses enterprise security controls entirely and accesses sensitive data without detection -- all from one click."
Read the full story | ZD NET



