Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits

Posted on September 30, 2025September 30, 2025 By CWS

Sep 30, 2025Ravie LakshmananArtificial Intelligence / Vulnerability
Cybersecurity researchers have disclosed three now-patched safety vulnerabilities impacting Google’s Gemini synthetic intelligence (AI) assistant that, if efficiently exploited, may have uncovered customers to main privateness dangers and information theft.
“They made Gemini susceptible to search-injection assaults on its Search Personalization Mannequin; log-to-prompt injection assaults towards Gemini Cloud Help; and exfiltration of the person’s saved info and site information by way of the Gemini Searching Device,” Tenable safety researcher Liv Matan mentioned in a report shared with The Hacker Information.

The vulnerabilities have been collectively codenamed the Gemini Trifecta by the cybersecurity firm. They reside in three distinct elements of the Gemini suite –

A immediate injection flaw in Gemini Cloud Help that might enable attackers to use cloud-based companies and compromise cloud assets by benefiting from the truth that the device is able to summarizing logs pulled instantly from uncooked logs, enabling the risk actor to hide a immediate inside a Person-Agent header as a part of an HTTP request to a Cloud Perform and different companies like Cloud Run, App Engine, Compute Engine, Cloud Endpoints, Cloud Asset API, Cloud Monitoring API, and Recommender API
A search-injection flaw within the Gemini Search Personalization mannequin that might enable attackers to inject prompts and management the AI chatbot’s conduct to leak a person’s saved info and site information by manipulating their Chrome search historical past utilizing JavaScript and leveraging the mannequin’s lack of ability to distinguish between reliable person queries and injected prompts from exterior sources
An oblique immediate injection flaw in Gemini Searching Device that might enable attackers to exfiltrate a person’s saved info and site information to an exterior server by benefiting from the inner name Gemini makes to summarize the content material of an online web page

Tenable mentioned the vulnerability may have been abused to embed the person’s non-public information inside a request to a malicious server managed by the attacker with out the necessity for Gemini to render hyperlinks or pictures.
“One impactful assault situation could be an attacker who injects a immediate that instructs Gemini to question all public property, or to question for IAM misconfigurations, after which creates a hyperlink that accommodates this delicate information,” Matan mentioned of the Cloud Help flaw. “This needs to be potential since Gemini has the permission to question property by way of the Cloud Asset API.”

Following accountable disclosure, Google has since stopped rendering hyperlinks within the responses for all log summarization responses, and has added extra hardening measures to safeguard towards immediate injections.
“The Gemini Trifecta reveals that AI itself could be changed into the assault car, not simply the goal. As organizations undertake AI, they can not overlook safety,” Matan mentioned. “Defending AI instruments requires visibility into the place they exist throughout the setting and strict enforcement of insurance policies to take care of management.”

The event comes as agentic safety platform CodeIntegrity detailed a brand new assault that abuses Notion’s AI agent for information exfiltration by hiding immediate directions in a PDF file utilizing white textual content on a white background that instructs the mannequin to gather confidential information after which ship it to the attackers.
“An agent with broad workspace entry can chain duties throughout paperwork, databases, and exterior connectors in methods RBAC by no means anticipated,” the corporate mentioned. “This creates a vastly expanded risk floor the place delicate information or actions could be exfiltrated or misused by way of multi step, automated workflows.”

The Hacker News Tags:Allowing, Cloud, Disclose, Exploits, Flaws, Gemini, Google, Injection, Prompt, Researchers

Post navigation

Previous Post: Linux 6.17 Released With Fix for use-after-free Vulnerabilities
Next Post: Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web

Related Posts

Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike The Hacker News
CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials The Hacker News
CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet The Hacker News
UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware The Hacker News
Understanding Help Desk Scams and How to Defend Your Organization The Hacker News
Beware the Hidden Risk in Your Entra Environment The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News