TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home Tech Security
Google patches critical Gemini flaw that turned invites into attack vectors

Google patches critical Gemini flaw that turned invites into attack vectors

Miggo Security identifies a natural language exploit that exfiltrates meeting summaries through malicious event descriptions and deceptive invites.

Kerem GülenbyKerem Gülen
21 January 2026
in Security, Tech
Reading Time: 2 mins read
Share on FacebookShare on Twitter

Researchers bypassed Google Gemini’s defenses using natural language instructions, creating misleading events to leak private Calendar data. This method allows sensitive data exfiltration to an attacker via a Calendar event description. Gemini, Google’s LLM assistant, integrates across Google web services and Workspace apps like Gmail and Calendar.

The Gemini-based Calendar invite attack begins with sending a target an event invite containing a prompt-injection payload in its description. Exfiltration activities trigger when the victim queries Gemini about their schedule. This causes the assistant to load and parse all relevant events, including the one with the attacker’s payload.

Researchers at Miggo Security, an Application Detection & Response (ADR) platform, found they could deceive Gemini into leaking Calendar data by providing natural language instructions. These included: summarizing all meetings on a specific day, including private ones; creating a new calendar event with that summary; and responding to the user with a harmless message.

The researchers explained, “Because Gemini automatically ingests and interprets event data to be helpful, an attacker who can influence event fields can plant natural language instructions that the model may later execute.” They discovered controlling an event’s description field allowed embedding a prompt that Google Gemini would obey, even with a harmful outcome.

The malicious invite’s payload remains dormant until the victim asks Gemini a routine question about their schedule. Upon execution of the embedded instructions from the malicious Calendar invite, Gemini creates a new event. It writes the private meeting summary into this new event’s description. In many enterprise settings, the updated description becomes visible to event participants, potentially leaking sensitive information to the attacker.

Miggo noted that Google employs a separate, isolated model for detecting malicious prompts in the primary Gemini assistant. However, their attack bypassed this failsafe because the instructions appeared safe. Prompt injection attacks via malicious Calendar event titles are not new. In August 2025, SafeBreach demonstrated a malicious Google Calendar invite could exploit Gemini agents to leak sensitive user data.

Liad Eliyahu, Miggo’s head of research, informed BleepingComputer that the new attack demonstrates Gemini’s reasoning capabilities remain vulnerable to manipulation despite Google implementing additional defenses after SafeBreach’s report. Miggo shared its findings with Google, which has since added new mitigations. Miggo’s attack concept highlights the complexities of anticipating new exploitation models in AI systems driven by natural language with ambiguous intent.

The researchers suggest application security must evolve from syntactic detection to context-aware defenses to address these vulnerabilities.


Featured image credit

Tags: GeminiGoogle
ShareTweet
Kerem Gülen

Kerem Gülen

Kerem from Turkey has an insatiable curiosity for the latest advancements in tech gadgets and a knack for innovative thinking.With 3 years of experience in editorship and a childhood dream of becoming a journalist, Kerem has always been curious about the latest tech gadgets and is constantly seeking new ways to create.As a Master's student in Strategic Communications, Kerem is eager to learn more about the ever-evolving world of technology. His primary focuses are artificial intelligence and digital inclusion, and he delves into the most current and accurate information on these topics.

Related Posts

OnePlus denies shutdown rumors following reports of 20% shipment decline

OnePlus denies shutdown rumors following reports of 20% shipment decline

21 January 2026
DeepSeek uncovers MODEL1 identifier ahead of V4 launch

DeepSeek uncovers MODEL1 identifier ahead of V4 launch

21 January 2026
Apple to shrink Dynamic Island on iPhone 18 Pro models

Apple to shrink Dynamic Island on iPhone 18 Pro models

21 January 2026
OpenAI launches ads in ChatGPT to offset trillion-dollar infrastructure costs

OpenAI launches ads in ChatGPT to offset trillion-dollar infrastructure costs

21 January 2026

LATEST

Türkiye competition authority raids Temu offices

OnePlus denies shutdown rumors following reports of 20% shipment decline

DeepSeek uncovers MODEL1 identifier ahead of V4 launch

Apple to shrink Dynamic Island on iPhone 18 Pro models

Nvidia shares dip as Inventec warns of H200 chip delays in China

OpenAI launches ads in ChatGPT to offset trillion-dollar infrastructure costs

Samsung revives Bixby with Perplexity AI for Galaxy S26 launch

Google patches critical Gemini flaw that turned invites into attack vectors

OpenAI targets H2 2026 launch for first ChatGPT-powered hardware

FTC appeals ruling in Meta antitrust case to revive divestiture threat

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska