Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Google Calendar for AI Security Breach

Hackers Exploit Google Calendar for AI Security Breach

Posted on February 12, 2026 By CWS

In a concerning development for digital security, researchers have unveiled a new cyber threat that manipulates Google Calendar invites to hijack personal AI assistants. This sophisticated attack, labeled as ‘Promptware,’ enables hackers to covertly access a victim’s camera through Zoom without needing to install traditional malware.

Understanding the Promptware Threat

Research conducted by experts from Ben-Gurion University, Tel Aviv University, and Harvard highlights a novel form of cyberattack that leverages Google Calendar to compromise AI systems. By sending a seemingly harmless calendar invite, attackers can manipulate Google’s Gemini assistant to unknowingly stream the victim’s video feed via Zoom. This method circumvents the need for conventional viruses, relying instead on a cleverly crafted invitation.

Mechanics of the Attack

The process, detailed in the paper “Invitation Is All You Need,” involves an ‘Indirect Prompt Injection’ where malicious commands are embedded within AI-readable text. Upon reading the calendar event, the AI executes these hidden instructions, altering its operational rules. A specific trigger phrase spoken by the user prompts the AI to activate the malicious task, such as opening Zoom and streaming the user’s video to the hacker’s controlled meeting.

Wider Implications and Precautions

Beyond video espionage, the Promptware technique can facilitate unauthorized control over smart devices, like unlocking doors or accessing emails, all initiated by an unaccepted calendar invite. Following the discovery, Google has implemented mitigations to counteract these vulnerabilities. However, users are advised to remain vigilant about invites from unknown sources, as they pose risks far greater than mere nuisance.

This evolution in cyber threats underscores the need for heightened awareness as AI assistants gain more control over digital environments. Staying informed and cautious can help mitigate the potential for such invasive attacks.

For continued updates on cybersecurity, follow us on Google News, LinkedIn, and X. Reach out for feature opportunities and in-depth analyses.

Cyber Security News Tags:AI assistant, AI security, Cyberattack, Cybersecurity, Google Calendar, Hackers, online privacy, Promptware, tech news, Zoom

Post navigation

Previous Post: Ransomware Threats Exploit Employee Monitoring Tools
Next Post: Ivanti EPMM Security Flaw Exploited by Single IP Source

Related Posts

AI Vibe Coding Platform Hacked AI Vibe Coding Platform Hacked Cyber Security News
F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands Cyber Security News
LLMs Tools Like GPT-3.5-Turbo and GPT-4 Fuels the Development of Fully Autonomous Malware LLMs Tools Like GPT-3.5-Turbo and GPT-4 Fuels the Development of Fully Autonomous Malware Cyber Security News
Europol‑Backed Operation Leads to 34 Arrests in Black Axe Crime Network Bust Europol‑Backed Operation Leads to 34 Arrests in Black Axe Crime Network Bust Cyber Security News
Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details Cyber Security News
DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News