<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>The recent discovery of the Gemini Trifecta vulnerabilities by <a href="https://www.tenable.com/blog/the-trifecta-how-three-new-gemini-vulnerabilities-in-cloud-assist-search-model-and-browsing" rel="noopener" target="_blank">Tenable</a> underscores a growing reality: AI tools can be both the target and the vehicle of cyberattacks. Google’s Gemini AI assistant suffered three now-remediated issues that allowed prompt injection, search history manipulation, and data exfiltration through its browsing tool. <span>&nbsp;</span></p> <!--more--><p>These incidents are a reminder that as organizations embrace AI, every input becomes a potential infiltration point and every output becomes a possible exfiltration vector. Attackers can leverage AI-generated actions to steal sensitive data, move laterally in your environment, or bypass traditional security measures. <span>&nbsp;</span></p> <h3>How ThreatSTOP Keeps You Proactively Protected</h3> <p>At ThreatSTOP, we believe that visibility and control over AI and cloud traffic are essential. Our Protective DNS solutions, DNS Defense Cloud and DNS Defense provide the proactive protections needed to disrupt these AI-enabled attack chains before they cause damage.</p> <ol> <li>Block Command-and-Control (C2) Traffic <span>&nbsp;</span> <ul> <li>Prompt-injection attacks often lead to outbound data exfiltration. ThreatSTOP Protective DNS automatically prevents connections to known malicious domains, stopping Gemini-like attacks from “calling home.”</li> </ul> </li> <li>Stop Malicious Browsing and Data Exfiltration <span>&nbsp;</span> <ul> <li>The Gemini Browsing Tool vulnerability relied on fetching malicious URLs. With ThreatSTOP IP&nbsp;Defense, you can block risky IP destinations across firewalls, routers, and cloud environments, eliminating exfiltration paths.</li> </ul> </li> <li>Neutralize Indirect Prompt Injection Sources <span>&nbsp;</span> <ul> <li>Attacks like log or search history poisoning often require the victim to touch a malicious domain first. ThreatSTOP’s real-time threat intelligence blocks these domains, removing the attacker’s first foothold.</li> </ul> </li> </ol> <h3>Partnering with GlassWing.ai for AI Usage Control</h3> <p>Our strategic partnership with <a href="https://www.glasswing.ai" rel="noopener" target="_blank">GlassWing.ai</a> allows ThreatSTOP customers to monitor and control AI interactions inside their environments. By combining network-level policy enforcement with AI-usage visibility, you gain:</p> <ul> <li>Insight into which AI tools are being used <span>&nbsp;</span></li> <li>The ability to block or quarantine suspicious AI sessions <span>&nbsp;</span></li> <li>Policy-driven control to prevent sensitive data from leaving your environment <span>&nbsp;</span></li> </ul> <p>Together, ThreatSTOP and GlassWing.ai empower organizations to embrace AI safely while disconnecting from risk.</p> <h3>Proactive Security for a New Era</h3> <p>The Gemini Trifecta highlights that AI-powered attacks are no longer hypothetical. With ThreatSTOP’s Protective DNS and IP Defense, combined with GlassWing.ai’s AI governance, your organization can prevent infiltration, stop exfiltration, and stay ahead of emerging threats.</p> <p>For those interested in joining the ThreatSTOP family, or to learn more about our proactive protections for all environments, we invite you to visit our <a href="/threatstop-platform" rel="noopener" target="_blank">product page</a>. Discover how our solutions can make a significant difference in your digital security landscape. We have pricing for all sizes of customers! Get started with a Demo today! <span>&nbsp;<a href="/contact" rel="noopener" target="_blank">Contact us for more about our GlassWing.ai partnership</a>.</span></p> <p style="font-weight: bold;">MITRE ATT&amp;CK Mapping</p> <p>&nbsp;</p> <table style="border-collapse: collapse; table-layout: fixed; margin-left: auto; margin-right: auto; border: 1px solid #99acc2;" data-hsprotectcellspacing="0"> <tbody> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>MITRE ATT&amp;CK Tactic</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Example Technique</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>How ThreatSTOP Helps</p> </td> </tr> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Initial Access</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>T1566 – Phishing / T1189 – Drive-by Compromise</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Blocks malicious AI-linked domains via Protective DNS</p> </td> </tr> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Execution</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>T1059 – Command Execution via Prompt Injection</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Reduces attacker success by denying communication with C2 IPs</p> </td> </tr> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Collection</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>T1530 – Data from Cloud Storage</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Stops unauthorized data movement to malicious destinations</p> </td> </tr> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Exfiltration</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>T1041 – Exfiltration over C2 Channel</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Blocks outgoing traffic to attacker-controlled IPs and domains</p> </td> </tr> <tr> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Command and Control</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>T1071 – Application Layer Protocol</p> </td> <td style="padding: 0px;" data-hsprotectvalign="middle"> <p>Disrupts communication via domain and IP-based policy enforcement</p> </td> </tr> </tbody> </table> <p>&nbsp;</p> <p style="font-weight: bold;">Connect with Customers, Disconnect from Risks.</p></span>