[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fRL0-ktEsAlr96y1pmtYX4mJc3mAN6ix0md7esmwpGnw":3},{"article":4,"iocs":39},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":27,"category":28,"article_tags":31},"29cb4ab3-74ca-4435-b540-9d9726989394","Your AI agent reads a resume. Hidden inside: a command to steal data. No malware. Just prompt inj...","your-ai-agent-reads-a-resume-hidden-inside-a-command-to-steal-data-no-malware-ju-b63b13","Your AI agent reads a resume. Hidden inside: a command to steal data. No malware. Just prompt injection.\n\n⚡Agent executes it\n📥Data gets exfiltrated\n🔑Tokens exposed\n\nFalcon AIDR stops it before the agent ever sees it.\n\nFull demo: https:\u002F\u002Ft.co\u002F7iTSDMPeTA https:\u002F\u002Ft.co\u002F8tbcbLjR33","A demonstration shows how hidden prompt injection commands can be embedded in documents like resumes to manipulate AI agents into exfiltrating sensitive data without deploying traditional malware. The attack exploits the agent's inability to distinguish between legitimate document content and malicious instructions. CrowdStrike's Falcon AIDR product is positioned as a detection and prevention mechanism for such attacks.","Prompt injection attack embedded in resume steals data from AI agent without malware.",null,"https:\u002F\u002Fx.com\u002FCrowdStrike\u002Fstatus\u002F2050274050182717727","https:\u002F\u002Fpbs.twimg.com\u002Fmedia\u002FHHQAXzNXsAAfCWZ.jpg","2026-05-01T18:00:00+00:00","2026-05-01T19:00:07.257989+00:00",7,[18,21,24],{"name":19,"type":20},"CrowdStrike","vendor",{"name":22,"type":23},"Falcon AIDR","product",{"name":25,"type":26},"Prompt Injection","technology","839da5c1-3c34-47e2-9499-f7201640e3ac",{"id":27,"icon":11,"name":29,"slug":30},"AI Security","ai-security",[32,34],{"category":33},{"id":27,"icon":11,"name":29,"slug":30},{"category":35},{"id":36,"icon":11,"name":37,"slug":38},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[]]