Robuta

Sponsor of the Day: Jerkmate
https://www.infoq.com/news/2026/03/litellm-supply-chain-attack/ PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information -... Mar 31, 2026 - Discovered by FutureSearch researcher Callum McMahon, a supply chain attack against LiteLLM on PyPI resulted in over 40 thousand downloads of a compromised... pypi supply chainsensitive informationattackcompromiseslitellm https://attack.mitre.org/techniques/T1567/002/ Exfiltration Over Web Service: Exfiltration to Cloud Storage, Sub-technique T1567.002 - Enterprise... web servicecloud storagesub technique002 enterpriseexfiltration https://www.quickheal.com/blogs/tag/exfiltration/ exfiltration - Home exfiltration https://www.first.org/global/sigs/dns/stakeholder-advice/detection/infiltration-and-exfiltration-via-the-dns DNS Abuse Detection: Infiltration and exfiltration via the DNS dns abuse detectionexfiltration viainfiltration https://attack.mitre.org/tactics/TA0010/ Exfiltration, Tactic TA0010 - Enterprise | MITRE ATT&CK® enterprise mitre attexfiltrationtactic https://simonwillison.net/2024/Aug/20/data-exfiltration-from-slack-ai/ Data Exfiltration from Slack AI via indirect prompt injection Today's prompt injection data exfiltration vulnerability affects Slack. Slack AI implements a RAG-style chat search interface against public and private data... via indirect promptdata exfiltrationslack aiinjection https://vercara.digicert.com/resources/dns-infiltration-and-exfiltration DNS Infiltration and Exfiltration Dec 15, 2025 - Learn about DNS infiltration and exfiltration, sophisticated techniques using DNS tunneling for covert data transfer. Discover strategies to protect your... dnsinfiltrationexfiltration https://simonwillison.net/tags/exfiltration-attacks/ Simon Willison on exfiltration-attacks 43 posts tagged ‘exfiltration-attacks’. Exfiltration attacks are prompt injection attacks against chatbots that have access to private information, where that... simon willisonexfiltrationattacks https://petsymposium.org/popets/2018/popets-2018-0030.php PoPETs Proceedings — Panoptispy: Characterizing Audio and Video Exfiltration from Android... popetsproceedingscharacterizingaudiovideo https://attack.mitre.org/techniques/T1048/ Exfiltration Over Alternative Protocol, Technique T1048 - Enterprise | MITRE ATT&CK® enterprise mitre attexfiltrationalternativeprotocoltechnique https://www.proofpoint.com/uk/products/data-security-governance Defend against data exfiltration, data exposures and insider threats | Proofpoint UK Modernize your DLP program with human-centric data protection solutions from Proofpoint. Discover our human-centric, omni-channel approach. data exfiltrationinsider threatsproofpoint ukdefendexposures https://threats.wiz.io/all-incidents/weaver-ant-data-exfiltration-campaign Weaver Ant data exfiltration campaign Sygnia uncovered a prolonged cyber-espionage campaign targeting a major Asian telecom provider, orchestrated by a China-nexus APT group dubbed Weaver Ant. The... data exfiltrationweaverantcampaign https://webtransparency.cs.princeton.edu/no_boundaries/ No boundaries: data exfiltration by third parties embedded on web pages boundaries datathird partiesweb pagesexfiltrationembedded https://www.nightfall.ai/solutions/prevent-data-exfiltration-anywhere Stop Data Exfiltration Anywhere | Nightfall AI Stop data exfiltration through any threat vector – from SaaS apps, shadow AI usage, browsers and endpoints – with complete lineage tracking. stop datanightfall aiexfiltrationanywhere https://www.promptarmor.com/resources/data-exfiltration-from-writer-com-via-indirect-prompt-injection Data Exfiltration from Writer.com via Indirect Prompt Injection This vulnerability allows attackers to steal a user’s private documents by manipulating the language model used for content generation. via indirect promptdata exfiltrationwriterinjection https://embracethered.com/blog/posts/2025/claude-abusing-network-access-and-anthropic-api-for-data-exfiltration/ Claude Pirate: Abusing Anthropic's File API For Data Exfiltration · Embrace The Red Recently, Anthropic added the capability for Claude’s Code Interpreter to perform network requests. This is obviously very dangerous as we will see in … file apidata exfiltrationclaudepirateabusing https://research.jfrog.com/post/hugging-face-exfil/ js-logger-pack Operator Turns Hugging Face into a Malware CDN and Exfiltration Backend - JFrog... New versions of the malicious npm package `js-logger-pack`, including `1.1.27`, have shifted exfiltration to Hugging Face. Earlier versions already used the... hugging facejsloggerpackoperator https://www.proofpoint.com/us/threat-reference/data-exfiltration What Is Data Exfiltration? Meaning & Prevention | Proofpoint US Data exfiltration is the unauthorized data movement from a server or individual’s computer. Learn about the exfiltration of data and why it matters. prevention proofpoint usdata exfiltrationmeaning https://securityonline.info/tag/data-exfiltration/page/2/ data exfiltration Archives • Page 2 of 3 • Daily CyberSecurity data exfiltration archives3 daily2cybersecurity https://www.csoonline.com/article/4117792/one-click-is-all-it-takes-how-reprompt-turned-microsoft-copilot-into-data-exfiltration-tools.html One click is all it takes: How ‘Reprompt’ turned Microsoft Copilot into data exfiltration tools |... Jan 16, 2026 - A new Copilot exploit reveals how LLMs can be quietly turned into always-on data exfiltration tools. turned microsoftdata exfiltrationonetakescopilot https://lantern.splunk.com/Security_Use_Cases/Anomaly_Detection/Detecting_data_exfiltration_activities Detecting data exfiltration activities - Splunk Lantern Mar 5, 2026 - Detect data exfiltration activities with searches to help you identify data identification, collection, and staging tactics used by attackers. data exfiltrationsplunk lanterndetectingactivities https://blog.citp.princeton.edu/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/ No boundaries: Exfiltration of personal data by session-replay scripts - CITP Blog This is the first post in our “No Boundaries” series, in which we reveal how third-party scripts on websites have been extracting personal information in... personal datasession replaycitp blogboundariesexfiltration https://digital.ai/threat-data-exfiltration/ Data Exfiltration Digital.ai Jun 30, 2025 - Data exfiltration refers to the unauthorized transfer of sensitive information from a system or network. In the context of client-facing applications, this data exfiltrationdigital ai https://www.promptarmor.com/resources/notion-ai-unpatched-data-exfiltration Notion AI: Data Exfiltration Notion AI was susceptible to data exfiltration via indirect prompt injection due to a vulnerability in which AI document edits are saved before user approval. notion aidata exfiltration https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/ DEV-0537 criminal actor targeting organizations for data exfiltration and destruction | Microsoft... Jun 20, 2025 - The activity we have observed has been attributed to a threat group that Microsoft tracks as DEV-0537, also known as LAPSUS$. DEV-0537 is known for using a... data exfiltrationdev0537criminalactor https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/conti/proc_creation_win_malware_conti_7zip/ Conti NTDS Exfiltration Command | Detection.FYI Detects a command used by conti to exfiltrate NTDS detection fyicontintdsexfiltrationcommand https://detection.fyi/tags/attack.exfiltration/ attack.exfiltration | Detection.FYI detection fyiattackexfiltration https://l0.cm/svg_font/poc.php Data Exfiltration via CSS + SVG Font - PoC (Safari only) data exfiltrationvia csssvgfontpoc https://app-attack-matrix.com/techniques/Impact/Data%20Exfiltration/Data%20Exfiltration/ Data Exfiltration - Application Security Tactics & Techniques Matrix application security tacticsdata exfiltrationtechniques matrix https://www.f5.com.cn/glossary/data-exfiltration Data Exfiltration | F5 data exfiltrationf5 https://www.csoonline.com/article/4155004/zero%e2%80%91click-grafana-ai-attack-can-enable-enterprise-data-exfiltration.html Zero‑click Grafana AI attack can enable enterprise data exfiltration | CSO Online Apr 8, 2026 - By combining indirect prompt injection with client-side bypasses, attackers can force Grafana to leak sensitive data through routine image requests. ai attackenable enterprisedata exfiltrationcso onlinegrafana https://attack.mitre.org/techniques/T1041/ Exfiltration Over C2 Channel, Technique T1041 - Enterprise | MITRE ATT&CK® enterprise mitre attexfiltrationc2channeltechnique https://unit42.paloaltonetworks.com/tag/data-exfiltration/ data exfiltration Archives - Unit 42 data exfiltration archivesunit 42 https://www.codeintegrity.ai/blog/notion The Hidden Risk in Notion 3.0 AI Agents: Web Search Tool Abuse for Data Exfiltration |... Sep 19, 2025 - A critical security vulnerability in Notion 3.0's AI Agents demonstrates how the combination of LLM agents, tool access, and long-term memory creates... 3 0 aiweb search toolhidden riskdata exfiltrationnotion https://www.elastic.co/docs/reference/integrations/ded Data Exfiltration Detection | Elastic integrations The Data Exfiltration Detection (DED) package contains assets for detecting data exfiltration in network and file data. Data Exfiltration Detection package... data exfiltrationelastic integrationsdetection https://www.blackfog.com/ BlackFog AI Security for Data Exfiltration, Shadow AI and Ransomware Prevention Apr 26, 2026 - BlackFog provides AI Security for Data Exfiltration, Shadow AI and Ransomware Prevention using Anti Data Exfiltration ai securitydata exfiltrationransomware preventionblackfogshadow https://www.cyberhaven.com/product/how-data-lineage-works Trace Data from Origin to Exfiltration with Lineage | Cyberhaven Trace every piece of data from origin to destination. Our data lineage records every move, copy, edit, and share to protect data even after encryption. trace dataoriginexfiltrationlineagecyberhaven https://www.networkworld.com/article/4141183/ai-transforms-dangling-dns-into-automated-data-exfiltration-pipeline.html AI transforms 'dangling DNS' into automated data exfiltration pipeline | Network World Mar 6, 2026 - Generative AI is raising the risk of dangling DNS attack vectors, as the orphaned resources are no longer just a phishing nuisance. ai transformsdangling dnsautomated datapipeline networkexfiltration https://gurucul.com/blog/breaking-the-blind-spot-detecting-data-exfiltration-via-disposable-emails-in-bec-attacks/ Detecting Disposable Email Exfiltration in BEC Attacks Apr 6, 2026 - Detect disposable email exfiltration in BEC attacks and learn how attackers bypass controls using temporary domains for stealth data theft. disposable emailbec attacksdetectingexfiltration https://blog.pypi.org/posts/2025-09-16-github-actions-token-exfiltration/ Token Exfiltration Campaign via GitHub Actions Workflows - The Python Package Index Blog Incident report of a recent attack campaign targeting GitHub Actions workflows to exfiltrate PyPI tokens, our response, and steps to protect your projects. via github actionspython package indextokenexfiltrationcampaign https://www.f5.com/glossary/data-exfiltration Data Exfiltration | F5 data exfiltrationf5 https://www.proofpoint.com/au/products/data-security-governance Defend against data exfiltration, data exposures and insider threats | Proofpoint AU Modernize your DLP program with human-centric data protection solutions from Proofpoint. Discover our human-centric, omni-channel approach. data exfiltrationinsider threatsproofpoint audefendexposures https://www.computerworld.com/article/4117750/one-click-is-all-it-takes-how-reprompt-turned-microsoft-copilot-into-a-data-exfiltration-tool.html One click is all it takes: How ‘Reprompt’ turned Microsoft Copilot into a data exfiltration tool –... Jan 22, 2026 - A new Copilot exploit reveals how LLMs can be quietly turned into always-on data exfiltration tools. turned microsoftdata exfiltrationonetakescopilot https://www.cyberhaven.com/ Stop Data Exfiltration with the AI & Data Security Platform (DSPM, DLP & Insider Risk) | Cyberhaven Bring together DSPM, DLP, and insider risk management to prevent data exfiltration across SaaS, endpoints, cloud, and AI tools using Cyberhaven’s AI and data... ai security platformstop datadspm dlpinsider riskexfiltration https://attack.mitre.org/techniques/T1052/001/ Exfiltration Over Physical Medium: Exfiltration over USB, Sub-technique T1052.001 - Enterprise |... sub technique001 enterpriseexfiltrationphysicalmedium https://blog.citp.princeton.edu/2020/07/14/can-the-exfiltration-of-personal-data-by-web-trackers-be-stopped/ Can the exfiltration of personal data by web trackers be stopped? - CITP Blog by Günes Acar, Steven Englehardt, and Arvind Narayanan. In a series of posts on this blog in 2017/18, we revealed how web trackers exfiltrate personal... personal dataweb trackerscitp blogexfiltrationstopped https://www.mitiga.io/blog/ai-agent-supply-chain-risk-silent-codebase-exfiltration-via-skills AI Agent Supply Chain Risk: Silent Codebase Exfiltration via Skills Mitiga Labs shows how a malicious AI agent skill can silently exfiltrate an entire codebase, exposing a new supply chain risk in agentic AI environments. supply chain riskexfiltration viaagentsilentcodebase https://www.spamhaus.com/resource-center/context-for-anti-data-exfiltration-pioneer-blackfog-with-spamhaus-intelligence-api/ Case Study | Context for anti data exfiltration pioneer, BlackFog, with Spamhaus Intelligence API |... BlackFog is pioneering technology to prevent data exfiltration and ransomware. Using Spamhaus’ Intelligence API, BlackFog validates its rich data, providing... spamhaus intelligence apicase studydata exfiltrationcontextanti https://www.promptarmor.com/resources/data-exfiltration-from-slack-ai-via-indirect-prompt-injection Data Exfiltration from Slack AI via Indirect Prompt Injection This vulnerability can allow attackers to steal anything a user puts in a private Slack channel by manipulating the language model used for content generation. via indirect promptdata exfiltrationslack aiinjection https://unit42.paloaltonetworks.com/ja/tag/data-exfiltration-ja/ data exfiltration Archives - Unit 42 data exfiltration archivesunit 42 https://securityonline.info/tag/data-exfiltration/ data exfiltration Archives • Daily CyberSecurity data exfiltration archivesdaily cybersecurity https://www.halcyon.ai/platform/data-exfiltration-protection Data Exfiltration Protection Halcyon DXP detects and stops ransomware data theft early, alerting on suspicious outbound flows and blocking double-extortion attempts data exfiltrationprotection https://securityonline.info/the-dark-side-of-telegram-how-cybercriminals-weaponize-bot-apis-for-stealthy-data-exfiltration/ The Dark Side of Telegram: How Cybercriminals Weaponize Bot APIs for Stealthy Data Exfiltration A new Cofense report reveals how hackers abuse legitimate Telegram Bot APIs to create stealthy Command and Control (C2) centers for data exfiltration. dark sidedata exfiltrationtelegramcybercriminalsweaponize