Start your day with intelligence. Get The OODA Daily Pulse.
In June 2025, researchers uncovered a vulnerability that exposed sensitive Microsoft 365 Copilot data without any user interaction. Unlike conventional breaches that hinge on phishing or user error, this exploit, now known as EchoLeak, bypassed human behavior entirely, silently extracting confidential information by manipulating how Copilot interacts with user data. The incident highlights a sobering reality: Today’s security models, which are designed for predictable software systems and application-layer defenses, are ill-equipped to handle the dynamic, interconnected nature of AI infrastructure. AI has rapidly moved from experimental pilot projects to mission-critical infrastructure, driving unprecedented productivity gains and fundamentally shaping competitive advantage across industries. Yet, as EchoLeak so starkly demonstrated, this very AI integration exposes organizations to a new, sophisticated class of vulnerabilities: zero-click AI exploits that compromise sensitive data without any user interaction.
Full research : As AI embeds itself into every corner of business, most executives continue to underestimate the distinct security risks these systems pose.