Vulnerabilities in Chainlit could be exploited without user interaction to exfiltrate environment variables, credentials, ...
Attacks linked to APT and ransomware groups are relying on DLL sideloading for code execution instead of exploit-based ...
A Google Calendar event with a malicious description could be abused to instruct Gemini to leak summaries of a victim’s private meetings.