Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Google Calendar for AI Security Breach

Hackers Exploit Google Calendar for AI Security Breach

Posted on February 12, 2026 By CWS

In a concerning development for digital security, researchers have unveiled a new cyber threat that manipulates Google Calendar invites to hijack personal AI assistants. This sophisticated attack, labeled as ‘Promptware,’ enables hackers to covertly access a victim’s camera through Zoom without needing to install traditional malware.

Understanding the Promptware Threat

Research conducted by experts from Ben-Gurion University, Tel Aviv University, and Harvard highlights a novel form of cyberattack that leverages Google Calendar to compromise AI systems. By sending a seemingly harmless calendar invite, attackers can manipulate Google’s Gemini assistant to unknowingly stream the victim’s video feed via Zoom. This method circumvents the need for conventional viruses, relying instead on a cleverly crafted invitation.

Mechanics of the Attack

The process, detailed in the paper “Invitation Is All You Need,” involves an ‘Indirect Prompt Injection’ where malicious commands are embedded within AI-readable text. Upon reading the calendar event, the AI executes these hidden instructions, altering its operational rules. A specific trigger phrase spoken by the user prompts the AI to activate the malicious task, such as opening Zoom and streaming the user’s video to the hacker’s controlled meeting.

Wider Implications and Precautions

Beyond video espionage, the Promptware technique can facilitate unauthorized control over smart devices, like unlocking doors or accessing emails, all initiated by an unaccepted calendar invite. Following the discovery, Google has implemented mitigations to counteract these vulnerabilities. However, users are advised to remain vigilant about invites from unknown sources, as they pose risks far greater than mere nuisance.

This evolution in cyber threats underscores the need for heightened awareness as AI assistants gain more control over digital environments. Staying informed and cautious can help mitigate the potential for such invasive attacks.

For continued updates on cybersecurity, follow us on Google News, LinkedIn, and X. Reach out for feature opportunities and in-depth analyses.

Cyber Security News Tags:AI assistant, AI security, Cyberattack, Cybersecurity, Google Calendar, Hackers, online privacy, Promptware, tech news, Zoom

Post navigation

Previous Post: Ransomware Threats Exploit Employee Monitoring Tools
Next Post: Ivanti EPMM Security Flaw Exploited by Single IP Source

Related Posts

Conti Group Member Responsible for Deploying Ransomware Extradited to USA Conti Group Member Responsible for Deploying Ransomware Extradited to USA Cyber Security News
Critical Open Source Easyjson Library Under Full Control of Russian Company Critical Open Source Easyjson Library Under Full Control of Russian Company Cyber Security News
Destructive Akira Ransomware Attack with a Single Click on CAPTCHA in Malicious Website Destructive Akira Ransomware Attack with a Single Click on CAPTCHA in Malicious Website Cyber Security News
Revolutionary Open-source LLM Vulnerability Scanner Launched Revolutionary Open-source LLM Vulnerability Scanner Launched Cyber Security News
Authorities Busted Ransomware Gang – Nine Laptops and 15 Mobile Devices Were Seized Authorities Busted Ransomware Gang – Nine Laptops and 15 Mobile Devices Were Seized Cyber Security News
New CometJacking Attack Let Attackers Turn Perplexity Browser Against You in One Click New CometJacking Attack Let Attackers Turn Perplexity Browser Against You in One Click Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News