Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers disclose the flaws in Google Gemini AI, enabling rapid injection and cloud exploits
Identity

Researchers disclose the flaws in Google Gemini AI, enabling rapid injection and cloud exploits

userBy userSeptember 30, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 30, 2025Ravi LakshmananArtificial Intelligence/Vulnerability

Google Gemini AI flaws

Cybersecurity researchers have revealed three currently patched security vulnerabilities affecting Google’s Gemini Artificial Intelligence (AI) assistant.

“They have made Gemini vulnerable to search injection attacks against search personalization models. Log-to-prompt injection attacks against GeminiCloudAssist, and removal of user stored information and location data through Gemini browsing tools.”

The vulnerability is called gemini triple codemed by cybersecurity companies. They exist in three different components of the Gemini Suite –

Gemini Cloud Assist’s rapid injection flaw allows attackers to exploit cloud-based services and compromise cloud resources by taking advantage of the fact that the tool can summarise logs pulled directly from the raw logs. Defects in search injection for APIs and recommended APIs GEMINI search personalization models. By injecting prompts, controlling the behavior of the AI ​​chatbot, using JavaScript to manipulate the chrome search history, leveraging model inability to direct the prompts of legitimate users to gemin, leaking user stored information and location data by manipulating chrome search history. This allows an attacker to exclude user stored information and location data to an external server by utilizing internal calls to be created by gemini to summarize the content of a web page.

DFIR Retainer Service

Tenable said the vulnerability could have been abused to embed user private data within requests to malicious servers controlled by attackers without the need for Gemini to render links or images.

“One of the impactful attack scenarios is to be an attacker injecting a prompt to instruct Gemini to query all public assets, or to query IAM’s misconceptions and create a hyperlink containing this sensitive data.” “This is possible because Gemini has permission to query assets through the Cloud Asset API.”

In the case of a second attack, the threat actor must first convince the user to inject a malicious search query with a quick injection into the victim’s browsing history and visit a website that has been set to poison it. Therefore, when the victim later interacts with Gemini’s search personalization model, the attacker’s instructions will be processed to steal sensitive data.

Following responsible disclosure, Google has since stopped rendering hyperlinks in responses for all log summary responses and added curing measures to protect against rapid injections.

“The Gemini Trifecta shows that AI itself can be transformed into attack vehicles as well as targets. As organizations adopt AI, security cannot be overlooked,” says Matan. “To protect AI tools, visibility into locations across the environment and strict enforcement of policies to maintain control.”

CIS Build Kit

This development is because the agent security platform CodeIntegrity detailed a new attack that abuses AI agents of conceptual AI agents by hiding rapid instructions in PDF files using white text on a white background that tells the model to collect sensitive data and send it to the attacker.

“An agent with access to a wide range of workspaces can chain tasks between documents, databases and external connectors in ways RBAC didn’t expect,” the company said. “This creates a significantly expanded threat surface that allows sensitive data or actions to be extended or misused through multi-step, automated workflows.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDoordash unveils autonomous robots built to deliver your food
Next Article PFAS Pollution and the Future of Industry: Why Prevention Must Outperform Repair
user
  • Website

Related Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.