{"id":8597,"date":"2025-11-10T14:32:26","date_gmt":"2025-11-10T14:32:26","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=8597"},"modified":"2025-11-10T14:32:27","modified_gmt":"2025-11-10T14:32:27","slug":"information-transient-collaboration-apps-face-safety-scrutiny-once-more","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=8597","title":{"rendered":"Information transient: Collaboration apps face safety scrutiny &#8212; once more"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"content-body\">&#13;<\/p>\n<p>Collaboration instruments are a staple within the fashionable workforce. The keystone to getting work executed, crew collaboration instruments comparable to Slack, Groups, Zoom, Trello, Notion and Google Workspace allow workers far and vast to message one another, share paperwork and recordsdata, talk in actual time by way of voice and video conferencing, and monitor assignments.<\/p>\n<p>However what occurs when these instruments that <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchunifiedcommunications\/definition\/team-collaboration-tools\">enhance productiveness and enhance workers&#8217; focus<\/a> grow to be a safety risk?<\/p>\n<p>Mimecast&#8217;s &#8220;The State of Human Threat 2025&#8221; discovered that 79% of safety leaders suppose collaboration instruments pose new threats, and 61% claimed their group expects to expertise a breach associated to a collaboration software.<\/p>\n<p>This week&#8217;s featured information focuses on two assaults associated to distinguished enterprise collaboration instruments, in addition to new vulnerabilities within the already <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/ChatGPT-security-risks-in-the-enterprise\">security-problematic ChatGPT<\/a>.<\/p>\n<section class=\"section main-article-chapter\" data-menu-title=\"Nikkei suffers major slack data breach\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>Nikkei suffers main slack knowledge breach<\/h2>\n<p>Japanese media conglomerate Nikkei Inc. on Wednesday disclosed an information breach affecting greater than 17,000 worker Slack accounts.<\/p>\n<p>The incident occurred when an worker&#8217;s private pc was contaminated with malware, resulting in the theft of their Slack authentication credentials. Attackers used these credentials to realize unauthorized entry to the corporate&#8217;s Slack workspace, exposing names, electronic mail addresses and chat histories of workers and enterprise companions.<\/p>\n<p>The breach was found in September, prompting rapid safety measures, together with password modifications.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/nikkei-suffers-breach-slack-compromise\" rel=\"noopener\"><i>Learn the total story by Rob Wright on Darkish Studying<\/i><\/a><i>.<\/i><\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"Teams flaws enable message manipulation and executive impersonation\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>Groups flaws allow message manipulation and government impersonation<\/h2>\n<p>Test Level Analysis found 4 essential vulnerabilities in Microsoft Groups that allow attackers to govern messages, spoof notifications and impersonate executives. For instance, attackers can edit messages with out leaving &#8220;edited&#8221; labels, alter message notifications to look from totally different senders, change show names in non-public chats and alter caller identities in video and audio calls.<\/p>\n<p>The vulnerabilities have an effect on Groups&#8217; 320-plus million customers and pose vital dangers for <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/feature\/Explore-5-business-email-compromise-examples-to-learn-from\">enterprise electronic mail compromise<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/How-to-avoid-and-prevent-social-engineering-attacks\">social engineering assaults<\/a>.<\/p>\n<p>Microsoft has addressed the problems by means of a number of fixes, with the newest updates accomplished final month specializing in audio and video message issues. The invention highlights rising issues about refined assaults concentrating on company executives and privileged accounts by means of manipulation of trusted communication platforms.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" href=\"https:\/\/www.cybersecuritydive.com\/news\/researchers-flaws-manipulation-microsoft-teams-messages\/804636\/\" rel=\"noopener\"><i>Learn the total story by David Jones on Cybersecurity Dive<\/i><\/a><i>.<\/i><\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"ChatGPT vulnerabilities enable data theft and user manipulation\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>ChatGPT vulnerabilities allow knowledge theft and consumer manipulation<\/h2>\n<p>Tenable researchers found seven essential vulnerabilities in OpenAI&#8217;s ChatGPT that would expose thousands and thousands of customers to privateness breaches and manipulation assaults.<\/p>\n<p>The issues stem from how ChatGPT and SearchGPT course of exterior net content material, enabling attackers to inject malicious prompts by means of weblog feedback, poisoned search outcomes and specifically crafted URLs. Key assault strategies embody <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/Types-of-prompt-injection-attacks-and-how-they-work\">oblique immediate injection<\/a> by way of trusted web sites, one-click exploitation by means of malicious ChatGPT URLs and zero-click vulnerabilities.<\/p>\n<p>The issues allow attackers to exfiltrate non-public chat histories, bypass security filters and create persistent entry. Whereas reported to OpenAI in April, many points stay unresolved, highlighting ongoing safety challenges in massive language fashions and the necessity for enterprise warning when integrating AI chatbots.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" href=\"https:\/\/www.darkreading.com\/application-security\/multiple-chatgpt-security-bugs-rampant-data-theft\" rel=\"noopener\"><i>Learn the total story by Jai Vijayan on Darkish Studying<\/i><\/a><i>.<\/i><\/p>\n<p><b>Editor&#8217;s word:<\/b> <i>An editor used AI instruments to assist within the era of this information transient. Our skilled editors all the time evaluation and edit content material earlier than publishing.<\/i><\/p>\n<p><i>Sharon Shea is government editor of Informa TechTarget&#8217;s SearchSecurity website.<\/i><\/p>\n<\/section>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>&#13; Collaboration instruments are a staple within the fashionable workforce. The keystone to getting work executed, crew collaboration instruments comparable to Slack, Groups, Zoom, Trello, Notion and Google Workspace allow workers far and vast to message one another, share paperwork and recordsdata, talk in actual time by way of voice and video conferencing, and monitor [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8599,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[588,620,3102,121,6355,211],"class_list":["post-8597","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-apps","tag-collaboration","tag-face","tag-news","tag-scrutiny","tag-security"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/8597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8597"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/8597\/revisions"}],"predecessor-version":[{"id":8598,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/8597\/revisions\/8598"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/8599"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-07 03:26:11 UTC -->