<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Protection &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/data-protection/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Wed, 26 Nov 2025 15:46:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Data Protection &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>WhatsApp Screen-Sharing Scam Exposes Users to Data Theft</title>
		<link>https://firsthackersnews.com/whatsapp-screen-share/</link>
					<comments>https://firsthackersnews.com/whatsapp-screen-share/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 19 Nov 2025 09:42:14 +0000</pubDate>
				<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[data theft]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Screen share]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[whatsapp]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10661</guid>

					<description><![CDATA[<p>A new and rapidly growing scam is targeting WhatsApp users worldwide, exploiting the platform’s screen-sharing feature introduced in</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/whatsapp-screen-share/">WhatsApp Screen-Sharing Scam Exposes Users to Data Theft</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new and rapidly growing scam is targeting WhatsApp users worldwide, exploiting the platform’s screen-sharing feature introduced in 2023. Cybercriminals are using this tool to trick victims into revealing highly sensitive financial and personal information.</p>



<p>Cases have been reported across the United Kingdom, India, Hong Kong, and Brazil, including a major incident in Hong Kong where a victim lost HK$5.5 million (US$700,000). The scam shows how easily trusted communication apps can be turned into attack vectors when social engineering is combined with direct access to a user’s screen.</p>



<p>This operation relies entirely on manipulation rather than advanced malware. Attackers make unsolicited WhatsApp video calls while pretending to be bank officials, Meta support staff, or even distressed family members, convincing users to share their screen and unknowingly expose critical data.</p>



<h3 class="wp-block-heading"><strong>How Attackers Create Credibility and Urgency</strong></h3>



<p>Attackers use several tactics to appear credible. They often spoof local phone numbers and keep their video feed blurred or disabled to avoid revealing their identity. </p>



<p>To pressure the victim, they create a sense of urgency by claiming suspicious account activity, unauthorized credit card charges, or pending verification issues that require immediate action.</p>



<p>According to ESET security researchers, this scam is a highly effective form of remote access fraud because it combines three powerful elements: the trust created by impersonating an authority figure, the urgency generated through false threats, and the control gained through screen-sharing or remote access tools. Together, these factors give criminals near-complete visibility into a victim’s smartphone.</p>



<p>Once a user begins sharing their screen, the attacker’s access becomes extensive. They can see passwords, two-factor authentication codes, one-time passwords, and banking apps in real time. They may capture screenshots, direct victims to open financial apps, or persuade them to approve unauthorized transfers while pretending to “resolve” an issue.</p>



<p>In many cases, attackers escalate the scam by convincing users to install remote access apps like AnyDesk or TeamViewer, granting full control over the device. Some victims also unknowingly install malware such as keyloggers, which silently record sensitive information for later misuse.</p>



<p>From a technical standpoint, the risk is severe. If attackers gain access to incoming messages and WhatsApp verification codes through screen-sharing, they can immediately take over the victim’s WhatsApp account. With full account access, they can view conversations, financial information, and contacts.</p>



<p>Criminals then use the hijacked account to steal money, take over social media profiles, and impersonate the victim to target friends and family, creating a chain reaction of fraud.</p>



<h2 class="wp-block-heading"><strong>Preventing Screen-Sharing Fraud</strong></h2>



<p>Protecting against this threat relies mostly on user awareness and careful behavior. Screen sharing should never be granted to unknown or unsolicited callers, and any urgent claims should be verified directly with official sources.</p>



<p>Enabling WhatsApp’s two-step verification (Settings → Account → Two-step verification) adds an essential layer of protection, ensuring attackers cannot access the account even if they obtain verification codes.</p>



<p>This scam underscores a core truth in cybersecurity: social engineering remains one of the most powerful tools for criminals. Staying skeptical, alert, and cautious is the strongest defense against these attacks.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/whatsapp-screen-share/">WhatsApp Screen-Sharing Scam Exposes Users to Data Theft</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/whatsapp-screen-share/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Active Exploits Target Critical FortiWeb WAF Flaw</title>
		<link>https://firsthackersnews.com/cve-2025-64446/</link>
					<comments>https://firsthackersnews.com/cve-2025-64446/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 17 Nov 2025 03:53:09 +0000</pubDate>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[fortiweb]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<category><![CDATA[WAF Flaw]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10647</guid>

					<description><![CDATA[<p>Fortinet has released an urgent security update for a critical vulnerability in FortiWeb Web Application Firewall (WAF). This</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2025-64446/">Active Exploits Target Critical FortiWeb WAF Flaw</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Fortinet has released an urgent security update for a critical vulnerability in FortiWeb Web Application Firewall (WAF). This flaw is already being used by attackers, so updating your device is extremely important.</p>



<p>The vulnerability, <strong>CVE-2025-64446</strong>, allows attackers to run admin-level commands without logging in. This means they can take complete control of the system. The issue has a <strong>CVSS score of 9.1</strong>, making it very serious.</p>



<p>The problem comes from a path traversal bug in the FortiWeb GUI. With a specially crafted HTTP or HTTPS request, attackers can bypass security checks and run commands with full privileges. This can result in:</p>



<ul class="wp-block-list">
<li>Creating unauthorized admin accounts</li>



<li>Stealing data</li>



<li>Total system compromise</li>
</ul>



<p>Fortinet has confirmed active attacks, so patching immediately is strongly recommended.</p>



<p><strong>Affected Versions:</strong><br>FortiWeb 8.0, 7.6, 7.4, 7.2, and 7.0</p>



<p><strong>Recommended Updated Versions:</strong><br>8.0.2, 7.6.5, 7.4.10, 7.2.12, and 7.0.12 or higher</p>



<p>If you cannot apply the update right away, Fortinet suggests disabling HTTP/HTTPS access to the management interface on all internet-facing interfaces. This can help reduce risk but should only be used as a temporary solution.</p>



<p>After updating, admins should check system logs and look for any unknown or suspicious admin accounts to ensure their device has not already been compromised.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2025-64446/">Active Exploits Target Critical FortiWeb WAF Flaw</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cve-2025-64446/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Teams Vulnerabilities Expose Users to Impersonation and Social Engineering Attacks</title>
		<link>https://firsthackersnews.com/microsoft-teams-vulnerabilities-2024-impersonation-attacks/</link>
					<comments>https://firsthackersnews.com/microsoft-teams-vulnerabilities-2024-impersonation-attacks/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 04 Nov 2025 15:59:46 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#CheckPointResearch]]></category>
		<category><![CDATA[#CVE202438197]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataProtection]]></category>
		<category><![CDATA[#InfoSecNews]]></category>
		<category><![CDATA[#MicrosoftTeams]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<category><![CDATA[#VulnerabilityAlert]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10582</guid>

					<description><![CDATA[<p>Cybersecurity researchers have revealed four critical vulnerabilities in Microsoft Teams that could have allowed attackers to impersonate colleagues,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-teams-vulnerabilities-2024-impersonation-attacks/">Microsoft Teams Vulnerabilities Expose Users to Impersonation and Social Engineering Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity researchers have revealed four critical vulnerabilities in Microsoft Teams that could have allowed attackers to impersonate colleagues, manipulate messages, and carry out social engineering attacks on users.</p>



<p>The flaws, discovered by Check Point Research, enabled threat actors to alter conversations, spoof sender identities, and exploit notifications to make malicious messages appear as if they came from trusted sources, including senior executives.</p>



<p>According to Check Point’s report, the issues were responsibly disclosed to Microsoft in March 2024. Microsoft addressed some of them in August 2024 under CVE-2024-38197, with additional security patches released in September 2024 and October 2025.</p>



<h2 class="wp-block-heading"><strong>How the Microsoft Teams Vulnerabilities Worked</strong></h2>



<p>Researchers found that the vulnerabilities made it possible to:</p>



<ul class="wp-block-list">
<li>Edit message content without showing the “Edited” label.</li>



<li>Change sender identity in both chat and notifications.</li>



<li>Modify display names in private chats, calls, and call notifications.</li>
</ul>



<p>These flaws could allow attackers to trick employees into clicking malicious links, sharing confidential data, or granting unauthorized access, posing significant risks to both internal and external communications.</p>



<h2 class="wp-block-heading"><strong>Microsoft’s Response</strong></h2>



<p>Microsoft categorized CVE-2024-38197 as a medium-severity spoofing vulnerability (CVSS score: 6.5) affecting Teams for iOS. The flaw could enable attackers to modify a sender’s name and conduct social engineering attacks to extract sensitive information.</p>



<p>In a recent security advisory, Microsoft emphasized that Microsoft Teams’ widespread adoption and extensive collaboration features make it a prime target for cybercriminals and state-sponsored actors. Attackers have increasingly exploited Teams’ chat, calls, and screen-sharing functions as part of broader phishing and impersonation campaigns.</p>



<h2 class="wp-block-heading"><strong>Industry Insight</strong></h2>



<p>Oded Vanunu, Head of Product Vulnerability Research at Check Point, highlighted the growing risk of trust-based attacks:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“These vulnerabilities hit at the heart of digital trust. Collaboration platforms like Teams are now as critical as email — and just as exposed,” said Vanunu.<br>“Threat actors don’t need to break in anymore; they just need to bend trust. Seeing isn’t believing anymore — verification is.”</p>
</blockquote>



<h2 class="wp-block-heading"><strong>Protecting Against Teams Exploits</strong></h2>



<p>Organizations are advised to:</p>



<ul class="wp-block-list">
<li>Apply the latest Microsoft Teams updates and patches immediately.</li>



<li>Educate employees about impersonation and phishing risks.</li>



<li>Implement advanced threat protection tools and zero-trust verification for collaboration platforms.</li>
</ul>



<p>As the reliance on Microsoft Teams continues to grow across enterprises, these findings underscore the importance of vigilance, patch management, and digital trust protection in modern communication environments.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-teams-vulnerabilities-2024-impersonation-attacks/">Microsoft Teams Vulnerabilities Expose Users to Impersonation and Social Engineering Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/microsoft-teams-vulnerabilities-2024-impersonation-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OpenAI Atlas Browser Vulnerability Exposed to Prompt Injection Attack</title>
		<link>https://firsthackersnews.com/openai-atlas-prompt-injection-vulnerability/</link>
					<comments>https://firsthackersnews.com/openai-atlas-prompt-injection-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 27 Oct 2025 10:33:43 +0000</pubDate>
				<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[AI Expansion]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[#AIThreats]]></category>
		<category><![CDATA[#AIVulnerability]]></category>
		<category><![CDATA[#BrowserSecurity]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#OpenAIAtlas]]></category>
		<category><![CDATA[#PromptInjection]]></category>
		<category><![CDATA[#TechUpdate]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10557</guid>

					<description><![CDATA[<p>A new security flaw has been discovered in the recently released OpenAI Atlas browser. The issue was reported</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/openai-atlas-prompt-injection-vulnerability/">OpenAI Atlas Browser Vulnerability Exposed to Prompt Injection Attack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new security flaw has been discovered in the recently released OpenAI Atlas browser. The issue was reported by cybersecurity firm NeuralTrust, which identified a prompt injection technique capable of compromising the browser’s built-in AI assistant.</p>



<p>The attack targets the Atlas omnibox, which serves as both an address bar and a search bar. It was revealed that the omnibox can mistakenly interpret a crafted string as a user command rather than a web address. Because of this, malicious inputs disguised as URLs can be used to manipulate the browser’s AI system.</p>



<p>According to the report, a fake URL beginning with “<a>https://my-wesite.com”</a> can be followed by hidden natural language instructions. When entered, Atlas fails to validate it as a proper URL and treats it as a prompt. This causes the AI to execute the embedded command, redirecting users to an attacker-controlled website or performing unauthorized actions.</p>



<p>Experts warned that this flaw could lead to phishing attacks, data theft, and remote exploitation. In a practical example, attackers could embed such fake links behind “Copy link” buttons, luring users to malicious pages or triggering harmful actions like deleting files from connected accounts such as Google Drive.</p>



<p>Security researcher Martí Jordà noted that omnibox prompts are treated as trusted input, meaning they may bypass several security checks applied to regular website content. This lack of isolation between user intent and page content created an opening for attackers to abuse the AI assistant’s trust model.</p>



<p>Alongside this finding, SquareX Labs disclosed another related threat called AI Sidebar Spoofing. The technique allows attackers to overlay a fake AI sidebar inside browsers such as Atlas and Perplexity Comet using malicious extensions. When users type prompts into the spoofed sidebar, the injected code can exfiltrate data, install malware, or redirect users to harmful websites.</p>



<p>Researchers described prompt injection as a growing security challenge for AI browsers, including OpenAI Atlas, Perplexity Comet, and Opera Neon. These attacks can be hidden inside web pages using white text, HTML comments, or even faint instructions embedded in images, which are read by AI systems through optical character recognition.</p>



<p>OpenAI’s Chief Information Security Officer, Dane Stuckey, acknowledged the issue in a public statement. He confirmed that the company has conducted extensive red-teaming, added safety guardrails, and trained models to ignore malicious instructions. However, he also admitted that prompt injection remains an unresolved frontier problem in AI security.</p>



<p>Perplexity and Brave have also confirmed that their own browsers face similar risks. Both companies have adopted multi-layered protection systems, including real-time detection, reinforcement filters, and transparency controls to defend against prompt-based attacks.</p>



<p>Experts agree that prompt injection represents a new phase in cybersecurity. The blending of artificial intelligence and web browsing has created new opportunities for productivity—but also new risks that demand constant monitoring and innovation.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/openai-atlas-prompt-injection-vulnerability/">OpenAI Atlas Browser Vulnerability Exposed to Prompt Injection Attack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/openai-atlas-prompt-injection-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zscaler Data Breach 2025: Customer Names, Emails, and Support Data Exposed in SalesLoft and Drift Hack</title>
		<link>https://firsthackersnews.com/zscaler-data-breach-2025-salesloft-drift-hack/</link>
					<comments>https://firsthackersnews.com/zscaler-data-breach-2025-salesloft-drift-hack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 02 Sep 2025 06:50:38 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataBreach2025]]></category>
		<category><![CDATA[#DriftCompromise]]></category>
		<category><![CDATA[#SalesforceBreach]]></category>
		<category><![CDATA[#SalesLoftHack]]></category>
		<category><![CDATA[#SupplyChainAttack]]></category>
		<category><![CDATA[#ZscalerBreach]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10477</guid>

					<description><![CDATA[<p>In a major cybersecurity incident shaking the tech world, Zscaler, a leading cloud security provider, has confirmed a</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zscaler-data-breach-2025-salesloft-drift-hack/">Zscaler Data Breach 2025: Customer Names, Emails, and Support Data Exposed in SalesLoft and Drift Hack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In a major cybersecurity incident shaking the tech world, Zscaler, a leading cloud security provider, has confirmed a data breach that exposed sensitive customer information due to a supply chain attack targeting SalesLoft and Drift integrations with Salesforce. This breach, reported on September 1, 2025, has sparked widespread concern about the vulnerabilities in third-party SaaS integrations. If you’re a Zscaler customer or care about data security, here’s everything you need to know about the breach, the exposed data, and how to protect yourself from potential fallout.</p>



<h2 class="wp-block-heading"><strong>What Happened in the Zscaler Data Breach?</strong></h2>



<p>The breach originated from a sophisticated supply chain attack exploiting SalesLoft’s Drift AI chat agent, which integrates with Salesforce to manage sales workflows. Threat actors, identified by Google Threat Intelligence Group (GTIG) as UNC6395, stole OAuth and refresh tokens from SalesLoft Drift, gaining unauthorized access to Zscaler’s Salesforce environment between August 8 and August 18, 2025. This allowed hackers to exfiltrate sensitive customer data from Zscaler’s Salesforce instance. Importantly, Zscaler’s core products, services, and infrastructure were not compromised, but the breach still poses significant risks due to the nature of the exposed information.</p>



<h2 class="wp-block-heading"><strong>Exposed Information: What Was Leaked?</strong></h2>



<p>The attackers accessed a range of sensitive customer data stored in Zscaler’s Salesforce environment. According to Zscaler’s advisory, the compromised information includes:</p>



<ul class="wp-block-list">
<li><strong>Customer Names</strong>: Full names of individuals associated with Zscaler accounts. </li>



<li><strong>Business Email Addresses</strong>: Corporate email IDs, which could be used for targeted phishing campaigns.</li>



<li> <strong>Job Titles</strong>: Professional roles, enabling attackers to craft convincing social engineering attacks.</li>



<li><strong>Phone Numbers</strong>: Business contact numbers, increasing the risk of voice phishing (vishing). </li>



<li><strong>Regional/Location Details</strong>: Geographic data tied to customer accounts. </li>



<li><strong>Zscaler Product Licensing and Commercial Information</strong>: Details about licensing agreements and commercial transactions.</li>



<li> <strong>Support Case Content</strong>: Plain text from certain customer support cases, though no attachments or files were included.</li>
</ul>



<p>While Zscaler has found no evidence of misuse so far, the stolen data is highly valuable for cybercriminals. It could be used for phishing, vishing, or social engineering attacks, where attackers impersonate Zscaler or trusted vendors to extract further sensitive information or credentials.</p>



<p>Data breaches like this aren&#8217;t just headlines – they have real-world consequences. Exposed customer info could be weaponized for:</p>



<ul class="wp-block-list">
<li><strong>Phishing and Social Engineering</strong>: Hackers might impersonate Zscaler to trick users into revealing more data. </li>



<li><strong>Reputation Damage</strong>: For Zscaler, a company built on trust in security, this could erode client confidence.</li>



<li> <strong>Industry Wake-Up Call</strong>: It underscores the need for robust vendor risk management, especially in cloud-based services.</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zscaler-data-breach-2025-salesloft-drift-hack/">Zscaler Data Breach 2025: Customer Names, Emails, and Support Data Exposed in SalesLoft and Drift Hack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zscaler-data-breach-2025-salesloft-drift-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Choicejacking Attack Exploits Public Chargers to Steal Data from Phones</title>
		<link>https://firsthackersnews.com/choicejacking-usb-attack-security-threat/</link>
					<comments>https://firsthackersnews.com/choicejacking-usb-attack-security-threat/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 30 Jul 2025 11:59:59 +0000</pubDate>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[#Choicejacking]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataProtection]]></category>
		<category><![CDATA[#PhoneSecurity]]></category>
		<category><![CDATA[#PublicChargingRisks]]></category>
		<category><![CDATA[#SmartphoneSafety]]></category>
		<category><![CDATA[#USBattack]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10440</guid>

					<description><![CDATA[<p>Choicejacking is a new USB attack that tricks phones into sharing data at public charging stations, bypassing security</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/choicejacking-usb-attack-security-threat/">New Choicejacking Attack Exploits Public Chargers to Steal Data from Phones</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Choicejacking is a new USB attack that tricks phones into sharing data at public charging stations, bypassing security prompts in milliseconds.</strong></p>



<p>If you believed using a public phone charger was safe, it&#8217;s time to reconsider. Despite multiple updates designed to protect smartphones from &#8220;juice jacking&#8221; attacks, cybersecurity experts have uncovered a new threat that bypasses these protections. A recent study reveals that attackers are now using a technique called &#8220;Choicejacking&#8221; to gain unauthorized access to smartphones, often without the user even noticing.</p>



<h2 class="wp-block-heading" style="font-style:normal;font-weight:800"><strong>From Juice Jacking to Choicejacking:</strong></h2>



<p>A New Threat to Your Smartphone Security.</p>



<p>While &#8220;juice jacking&#8221; has long been a known risk when using public phone chargers, a new form of attack has emerged: &#8220;Choicejacking.&#8221; This latest cybersecurity threat bypasses the protections put in place to safeguard your phone, exploiting unsuspecting users to gain unauthorized access, often without any visible signs of tampering.</p>



<h2 class="wp-block-heading" style="font-style:normal;font-weight:800"><strong>How Choicejacking Operates</strong>:</h2>



<p>Instead of using traditional malware, this attack exploits USB or Bluetooth input devices to mimic user actions. A compromised charging station can simulate keyboard inputs, overflow input buffers, or manipulate device communication protocols, stealthily switching your phone into data-transfer or debug mode.</p>



<p>The entire process happens in under 133 milliseconds—quicker than the blink of an eye—meaning the phone reacts before you even notice.</p>



<p>Adrianus Warmenhoven, a cybersecurity advisor at NordVPN, explains that the real danger lies in the illusion of control. “Choicejacking is especially dangerous because it tricks the device into making decisions the user never intended, all without them realizing it,” he said.</p>



<p>Once the attacker gains access, they can silently browse photos, read messages, or install malicious software.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="913" height="672" src="https://firsthackersnews.com/wp-content/uploads/2025/07/image-12.png" alt="" class="wp-image-10441" srcset="https://firsthackersnews.com/wp-content/uploads/2025/07/image-12-200x147.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-12-300x221.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-12-400x294.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-12-600x442.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-12-768x565.png 768w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-12-800x589.png 800w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-12.png 913w" sizes="(max-width: 913px) 100vw, 913px" /></figure>



<h2 class="wp-block-heading" style="font-style:normal;font-weight:800;text-transform:capitalize"><strong>Public Ports Aren’t Worth the Risk</strong>:</h2>



<p>The rise of Choicejacking underscores what cybersecurity experts have been warning for years: public USB ports are not safe. Whether you&#8217;re at airports, hotels, or cafés, a compromised charging station could be lurking, ready to hijack your device.</p>



<p>Warmenhoven cautions, “With just one misleading prompt, attackers can trick users into enabling data transfer, putting personal files and sensitive information at risk.”</p>



<p>This threat affects both Android and iOS users. While some platforms may offer more obvious prompts or charge-only options, the core vulnerabilities remain, and cybercriminals are always finding ways to bypass these safeguards.</p>



<h2 class="wp-block-heading" style="font-style:normal;font-weight:800;text-transform:capitalize"><strong>How to Protect Yourself:</strong></h2>



<p>Researchers recommend keeping your phone’s software up to date and avoiding unfamiliar charging ports whenever possible. Preparation is key—carrying a portable power bank is an easy way to stay in control while on the go. If you must plug in, opt for a wall outlet with your own cable and adapter rather than using a public USB port, especially those that seem suspicious or overly complex.</p>



<p>Some devices offer a &#8220;charge only&#8221; mode, which blocks any data transfer. If your phone has this option, make sure to enable it. While attackers continuously come up with new methods, staying vigilant and informed is your best defense.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/choicejacking-usb-attack-security-threat/">New Choicejacking Attack Exploits Public Chargers to Steal Data from Phones</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/choicejacking-usb-attack-security-threat/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
