Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits

Posted on September 30, 2025September 30, 2025 By CWS

Sep 30, 2025Ravie LakshmananArtificial Intelligence / Vulnerability
Cybersecurity researchers have disclosed three now-patched safety vulnerabilities impacting Google’s Gemini synthetic intelligence (AI) assistant that, if efficiently exploited, may have uncovered customers to main privateness dangers and information theft.
“They made Gemini susceptible to search-injection assaults on its Search Personalization Mannequin; log-to-prompt injection assaults towards Gemini Cloud Help; and exfiltration of the person’s saved info and site information by way of the Gemini Searching Device,” Tenable safety researcher Liv Matan mentioned in a report shared with The Hacker Information.

The vulnerabilities have been collectively codenamed the Gemini Trifecta by the cybersecurity firm. They reside in three distinct elements of the Gemini suite –

A immediate injection flaw in Gemini Cloud Help that might enable attackers to use cloud-based companies and compromise cloud assets by benefiting from the truth that the device is able to summarizing logs pulled instantly from uncooked logs, enabling the risk actor to hide a immediate inside a Person-Agent header as a part of an HTTP request to a Cloud Perform and different companies like Cloud Run, App Engine, Compute Engine, Cloud Endpoints, Cloud Asset API, Cloud Monitoring API, and Recommender API
A search-injection flaw within the Gemini Search Personalization mannequin that might enable attackers to inject prompts and management the AI chatbot’s conduct to leak a person’s saved info and site information by manipulating their Chrome search historical past utilizing JavaScript and leveraging the mannequin’s lack of ability to distinguish between reliable person queries and injected prompts from exterior sources
An oblique immediate injection flaw in Gemini Searching Device that might enable attackers to exfiltrate a person’s saved info and site information to an exterior server by benefiting from the inner name Gemini makes to summarize the content material of an online web page

Tenable mentioned the vulnerability may have been abused to embed the person’s non-public information inside a request to a malicious server managed by the attacker with out the necessity for Gemini to render hyperlinks or pictures.
“One impactful assault situation could be an attacker who injects a immediate that instructs Gemini to question all public property, or to question for IAM misconfigurations, after which creates a hyperlink that accommodates this delicate information,” Matan mentioned of the Cloud Help flaw. “This needs to be potential since Gemini has the permission to question property by way of the Cloud Asset API.”

Following accountable disclosure, Google has since stopped rendering hyperlinks within the responses for all log summarization responses, and has added extra hardening measures to safeguard towards immediate injections.
“The Gemini Trifecta reveals that AI itself could be changed into the assault car, not simply the goal. As organizations undertake AI, they can not overlook safety,” Matan mentioned. “Defending AI instruments requires visibility into the place they exist throughout the setting and strict enforcement of insurance policies to take care of management.”

The event comes as agentic safety platform CodeIntegrity detailed a brand new assault that abuses Notion’s AI agent for information exfiltration by hiding immediate directions in a PDF file utilizing white textual content on a white background that instructs the mannequin to gather confidential information after which ship it to the attackers.
“An agent with broad workspace entry can chain duties throughout paperwork, databases, and exterior connectors in methods RBAC by no means anticipated,” the corporate mentioned. “This creates a vastly expanded risk floor the place delicate information or actions could be exfiltrated or misused by way of multi step, automated workflows.”

The Hacker News Tags:Allowing, Cloud, Disclose, Exploits, Flaws, Gemini, Google, Injection, Prompt, Researchers

Post navigation

Previous Post: Linux 6.17 Released With Fix for use-after-free Vulnerabilities
Next Post: Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability

Related Posts

Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content The Hacker News
New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps The Hacker News
Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped The Hacker News
FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign The Hacker News
Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets The Hacker News
Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark