Don’t Accept This Invite! How We Weaponized Google Calendar to Break Gemini

Tuesday, March 24 | 3:00 PM

⚠️🤖 WARNING:Attendance may result in extreme paranoia regarding your inbox. On the bright side, we’re giving away some great goodies to those who survive the event.

Join Itai Goldman (Miggo Co-founder & CTO) and Ofer Gayer (VP Product) for a raw, uncut breakdown of the vulnerability that shook the AI security world in early 2026. This isn't a slide deck, it’s a live reconstruction of the "Miggo Security vs. Google Gemini" exploit.We will demonstrate how a single, harmless-looking calendar invite utilized semantic attacks to bypass Google’s strict guardrails, turning a helpful AI assistant into a silent corporate spy.

Meet the Speakers:

Itai Goldman
Miggo | Co-founder & CTO
Ofer Gayer
Miggo | VP Product

In this closed-door session, we will cover:

  • The Gemini Exploiting Google Calendar: Watch Gemini exfiltrate private data from a calendar invite without the user lifting a finger.
  • The "Semantic" Bypass: How we used natural language, not code, to break the most advanced AI controls.
  • The fix: A tangible framework for securing your own Agentic applications before and when they go into production.
  • The new agentic attack vectors and the business risk they create
Register for this event
Oops! Something went wrong while submitting the form.