AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Initial Access: February 13, 2026

This episode covers prompt injection, a hijacked Outlook add-in, commoditized mobile spyware, AI executive deepfake scams, IT-to-OT pivoting, and nation-state use of commercial LLMs to accelerate exploitation.

This week’s headlines reinforce a few consistent patterns. Attackers are manipulating AI-driven workflows to trigger actions across SaaS platforms. Trusted marketplace integrations are becoming long-term attack paths. Advanced mobile spyware is becoming more accessible. And AI-assisted reconnaissance is shrinking the window between exposure and exploitation.

None of this represents a brand-new exploit class. What’s changing is where risk concentrates: in automation, third-party integrations, mobile endpoints, and response speed.

Key Takeaways:

Promptware Leveraging Google Calendar Invites, Cyber Security News

  1. What matters: Calendar invites aren’t new, but integrating AI assistants into systems that can take action introduces risk. Prompt injection exposure depends on the quality of the model and the surrounding software, and weaknesses in one implementation likely indicate weaknesses elsewhere.
  2. What’s overhyped: The delivery vector itself isn’t novel. This is an old technique being adapted to an AI-enabled environment, not a fundamentally new class of attack.

First Malicious Outlook Add-In Stealing Credentials, The Hacker News

  1. What matters: Domain takeovers can occur in places people don’t typically look, including multi-tenant Microsoft applications. In this case, the abandoned domain was tied to an Outlook add-in that applied across tenants and had permissions to read and write mail. The combination of multi-tenant exposure and privileged permissions increases impact. Third-party applications and add-ins require active review as part of risk management.
  2. What’s overhyped: Domain takeover itself isn’t new, and the core mechanism is familiar from subdomain takeover patterns. The difference here is where it occurred, not how it worked.

ZeroDayRAT Mobile Spyware Kit, SecurityWeek

  1. What matters: Mobile exploitation typically requires user interaction, such as installing an application, but this toolkit appears to leverage a browser-based vulnerability where simply visiting a webpage can establish access. The tooling is packaged as an all-in-one system with a dashboard for operators, enabling payload customization and deployment through phishing or coercion. It can escalate privileges, access sensors, GPS, camera, microphone, and other device data. More broadly, capabilities traditionally associated with nation-state actors are being packaged and commoditized for broader use, lowering the barrier to entry.
  2. What’s overhyped: Malware being sold via Telegram or underground channels is not new. The “nation-state grade” label depends on the level of compromise achieved; if it is user-level rather than kernel-level, it is materially different from tools like Pegasus. Many mobile compromises still depend on user behavior, such as installing untrusted applications, particularly in less restrictive app ecosystems.

AI-Assisted Deepfake CEO + Zoom Scam, PC Gamer

  1. What matters: Deepfake technology is being used not just for fraud, but to gain initial access into environments. The attack chain is consistent: fake calendar invite, Zoom call with real-time video or voice impersonation, and instructions delivered under the authority of executive leadership. In this case, the impersonation was used in a “ClickFix” scenario to persuade the victim to run commands, establish a foothold, and then pivot within the environment. The targeting focus remains cryptocurrency and finance-related organizations.
  2. What’s overhyped: The attack chain itself is not new. Similar executive impersonation campaigns using video occurred as early as 2024, following the same pattern of calendar invite, trusted call, and authority-based instruction. The difference is continued use and refinement, not a new methodology.

Poland Energy Grid Cyberattack & CISA Warning, Cyber Scoop

  1. What matters: The core issue is segmentation between corporate IT environments and operational technology environments. In this case, an exposed edge device connected to the internet lacked proper segmentation from the internal network, enabling lateral movement. As IT and OT systems converge, including cloud-managed device updates delivered over the air, historical separation weakens, increasing pivot risk.
  2. What’s overhyped: The pivot itself is not novel. The underlying issue remains basic network-level segmentation rather than advanced tradecraft.

Nation-State Hackers Using Gemini, The Record

  1. What matters: LLMs are being used by threat actors to automate reconnaissance, exploitation, and post-exploitation activities, including gaining situational awareness and pivoting laterally. Prior incidents have shown LLMs conducting these tasks across multiple organizations. Commercial frontier models provide some monitoring through API usage, but open-source and locally run models remove that oversight. The result is increased automation and operational efficiency for attackers.
  2. What’s overhyped: This is not the first instance of LLMs being used by adversaries. The development reflects continued automation and efficiency gains rather than a new category of attack.

Sean McMillan Headshot

About the speaker, Sean McMillan

Community Specialist

Sean McMillan serves as the Community Specialist at Bishop Fox, where he combines his expertise in digital media with a knack for community engagement. He's the creator and host of "Galactic War Report," a Star Wars gaming podcast that has accumulated over a million downloads and made its mark on-stage at Star Wars Celebration Chicago in 2019.

More by Sean

Leron Gray Headshot BF

About the speaker, Leron Gray

Senior Security Consultant

Leron Gray is a senior security consultant on Bishop Fox's Red Team. With nine years of offensive security experience, he previously served on the Azure Red Team at Microsoft, as a penetration tester, and as a Cryptologic Technician (Networks) for the U.S. Navy.

Leron holds a Masters in Cyber Defense from Dakota State University and is a PhD candidate for Cyber Operations. He has a graduate certification in penetration testing and ethical hacking from SANS Technology Institute.

More by Leron

Brandon Kovacs Headshot

About the speaker, Brandon Kovacs

Senior Security Consultant

Brandon Kovacs (CRT, OSCP) is a Senior Security Consultant at Bishop Fox, where he specializes in red teaming, network penetration testing, and physical penetration testing. As a red team operator, he is adept at identifying critical attack chains that an external attacker could use to fully compromise organizations and reach high-value targets.

To support physical and external testing, Brandon has built the 2023 edition of Bishop Fox’s Tastic RFID Thief to include Wi-Fi and remote control, allowing for more effective capture of RFID badges from a few feet away. He actively performs research and development into artificial intelligence for use in offensive security engagements.

Brandon is also recognized as a deepfake expert, conducting speaking sessions and live demonstrations at several global security and technology conferences. His research focuses on using AI and high-quality deepfakes to perform social engineering.

More by Brandon

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.