<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Data-Security — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/data-security/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 29 Mar 2026 07:22:15 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/data-security/feed.xml" rel="self" type="application/rss+xml"/><item><title>Vulnerabilities in AI Agents Addressed by CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails</title><link>https://feed.craftedsignal.io/briefs/2026-03-ai-agent-vulns/</link><pubDate>Sun, 29 Mar 2026 07:22:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-ai-agent-vulns/</guid><description>CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails v0.20.0 to help organizations protect AI agents in production by blocking prompt injection attacks, redacting sensitive data, and controlling agent behavior.</description><content:encoded><![CDATA[<p>The transition of AI agents from experimental projects to mainstream business tools introduces new security risks. A compromised AI agent can expose customer data, execute unauthorized transactions, or violate compliance requirements across numerous interactions. CrowdStrike Falcon AIDR, with its support for NVIDIA NeMo Guardrails v0.20.0, provides enterprise-grade protection for agentic AI applications. This integration allows developers to manage agentic data access, control agent responses, and monitor access to tools and data sources, ensuring adherence to custom policy compliance and safety controls. The combined solution aims to provide organizations with the confidence, visibility, and control needed to deploy AI agents securely into production environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains access to an AI agent through various means (not specified in source).</li>
<li><strong>Prompt Injection:</strong> The attacker crafts a malicious prompt to inject unauthorized commands or manipulate the agent&rsquo;s intended behavior.</li>
<li><strong>Bypass Guardrails:</strong> The prompt injection attack attempts to bypass existing security measures and guardrails designed to constrain the agent&rsquo;s actions.</li>
<li><strong>Data Exfiltration:</strong> The compromised agent is coerced into revealing sensitive data, such as customer PII, account numbers, or internal repository references.</li>
<li><strong>Unauthorized Actions:</strong> The attacker exploits the agent to perform unauthorized transactions, manipulate refund policies, or execute malicious code.</li>
<li><strong>Workflow Compromise:</strong> The agent&rsquo;s workflows are hijacked to spread malicious content, like adversarial domains, to other systems or users.</li>
<li><strong>Lateral Movement (speculative):</strong> The compromised agent may be used as a beachhead to access other systems or data within the organization (not mentioned in source, implied).</li>
<li><strong>Impact:</strong> The attack results in data breaches, financial loss, reputational damage, and compliance violations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack on an AI agent can have significant consequences, including the exposure of customer data, unauthorized transactions, and compliance violations. The impact can be felt across thousands of interactions, potentially affecting financial services (exposure of account numbers and SSNs), healthcare organizations (compromise of PHI), customer service (exposure of customer PII), and software development teams (exposure of hardcoded secrets and internal repository references). The severity of the impact depends on the sensitivity of the data handled by the agent and the scope of its access and permissions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement CrowdStrike Falcon AIDR with NVIDIA NeMo Guardrails v0.20.0 to leverage built-in protections against prompt injection and data exfiltration as mentioned in the overview.</li>
<li>Configure Falcon AIDR policies tailored to specific security requirements, including named detection policies for chat input sanitization, chat output filtering, RAG data ingestion, and agent tool invocation (see Configuring Falcon AIDR Policies).</li>
<li>Utilize Falcon AIDR&rsquo;s data redaction capabilities to prevent the exposure of sensitive information such as account numbers, SSNs, and PHI, as highlighted in the use cases.</li>
<li>Monitor AI agent activity for suspicious behavior, such as attempts to access unauthorized data sources or execute unauthorized commands, using appropriate logging and alerting mechanisms.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ai</category><category>prompt-injection</category><category>data-security</category></item><item><title>CrowdStrike Falcon Data Security Introduction</title><link>https://feed.craftedsignal.io/briefs/2026-03-falcon-data-security/</link><pubDate>Sat, 28 Mar 2026 08:12:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-falcon-data-security/</guid><description>CrowdStrike's Falcon Data Security aims to protect sensitive data by providing visibility into data movement across various environments and preventing data theft.</description><content:encoded><![CDATA[<p>CrowdStrike has launched Falcon Data Security in March 2026. This solution is designed to help organizations gain enhanced visibility into their sensitive data, track its movement in real time, and prevent data theft across diverse environments including endpoints, browsers, SaaS applications, cloud services, GenAI tools, and agentic workflows. Falcon Data Security aims to address the challenges of modern data security by providing real-time assessment of sensitive data in motion, enabling security teams to detect and stop data breaches as they occur, shifting from traditional compliance-focused models to a core breach-prevention approach. The system integrates with the CrowdStrike Falcon platform to provide contextual data threat analysis using a unified Falcon sensor and console.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> A user accesses a SaaS application via a web browser on an endpoint.</li>
<li><strong>Data Handling:</strong> The user interacts with sensitive data (e.g., PII) within the SaaS application.</li>
<li><strong>Data Exfiltration Attempt:</strong> The user attempts to download or share the sensitive data outside the approved channels of the SaaS application.</li>
<li><strong>Real-time Assessment:</strong> Falcon Data Security assesses the data movement in real time, capturing the source, egress channel, user, and destination.</li>
<li><strong>Policy Evaluation:</strong> Falcon Data Security evaluates the data movement against predefined policies and rules.</li>
<li><strong>Detection and Intervention:</strong> If the data movement is deemed risky, Falcon Data Security triggers an alert and initiates automated investigation and remediation workflows.</li>
<li><strong>Breach Prevention:</strong> The risky data movement is stopped, preventing potential data exfiltration or exposure.</li>
<li><strong>Contextual Analysis:</strong> Security teams can analyze the event within the broader context of user behavior, device posture, and cloud access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful data theft can lead to significant financial losses, reputational damage, legal liabilities, and regulatory fines. The number of victims can range from a few individuals to millions, depending on the type and amount of data stolen. Sectors at risk include finance, healthcare, government, and any organization that handles sensitive customer data or intellectual property. Effective implementation of data security measures can mitigate these risks and ensure the confidentiality, integrity, and availability of critical information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging for web browsers (e.g., Chrome, Firefox) on endpoints to monitor access and data handling within SaaS applications to activate relevant detections (Log Source: process_creation, Product: windows/linux/macos).</li>
<li>Deploy the Sigma rule to detect suspicious data exfiltration attempts from SaaS applications through web browsers (See: Sigma rule for &ldquo;Detect Suspicious SaaS Data Exfiltration via Browser&rdquo;).</li>
<li>Implement network connection monitoring to track data transfer activities between endpoints and cloud services to detect unusual data flows (Log Source: network_connection, Product: windows/linux/macos).</li>
<li>Monitor endpoint file creation events, especially on removable media, to detect unauthorized data copying (Log Source: file_event, Product: windows/linux/macos).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>data-security</category><category>data-loss-prevention</category><category>crowdstrike</category></item></channel></rss>