Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Perplexity’s Comet Browser Screenshot Feature Vulnerability Let Attackers Inject Malicious Prompts

Perplexity’s Comet Browser Screenshot Feature Vulnerability Let Attackers Inject Malicious Prompts

Posted on October 23, 2025October 23, 2025 By CWS

A brand new vulnerability in Perplexity’s Comet AI browser permits attackers to inject malicious prompts by way of seemingly innocuous screenshots.

Disclosed on October 21, 2025, this flaw builds on earlier issues about immediate injection in agentic browsers, AI-powered instruments that act on customers’ behalf.

The invention highlights ongoing dangers in these rising applied sciences, the place hidden directions can hijack person classes and entry delicate information.

Of their newest report, Courageous’s Senior Cellular Safety Engineer Artem Chaikin and VP of Privateness and Safety Shivan Kaul Sahib element how Comet’s screenshot function, designed to let customers question pictures from web sites, will be exploited.

That is the second installment in Courageous’s sequence on safety challenges in agentic searching, following a previous disclosure of the same problem in Comet.

The researchers emphasize that such vulnerabilities should not remoted however symbolize a broader systemic drawback throughout AI browsers.

Hidden Textual content In Screenshots Bypasses Safeguards

The assault exploits Comet’s capacity to research screenshots for person questions. Attackers embed practically invisible malicious directions into internet content material, reminiscent of faint gentle blue textual content on a yellow background inside pictures.

These directions evade human detection however are extracted by the browser’s textual content recognition, possible by way of optical character recognition (OCR), and fed straight into the massive language mannequin (LLM) with out correct sanitization.

As soon as a person takes a screenshot of the contaminated web page, the hidden instructions masquerade as a part of the reliable question.

This methods the AI into executing dangerous actions, like navigating to phishing websites or extracting information from authenticated accounts.

As an illustration, if a person is logged into their financial institution or e-mail, a easy screenshot might authorize transfers or information theft, because the AI operates with the person’s privileges.

Courageous demonstrated the exploit in a managed setup, exhibiting how hidden prompts override person intent.

“AI browsers that take actions in your behalf are highly effective but extraordinarily dangerous,” the researchers word, referencing a Malwarebytes report on how even summarizing a Reddit put up might result in monetary loss.

This screenshot vulnerability echoes points in different browsers, like Fellou, the place navigating to a malicious web site sends web page content material to the LLM, permitting seen directions to govern queries.

Courageous has withheld particulars about an extra browser flaw and plans to reveal extra info quickly. The implications are vital as a result of conventional internet protections, such because the same-origin coverage, are ineffective right here; untrusted content material can affect the AI’s selections.

Attackers might goal on a regular basis situations, searching social media or boards to set off cross-domain exploits affecting banks, healthcare portals, or cloud storage.

Courageous responsibly reported the Comet problem to Perplexity on October 1, 2025, with public disclosure following on October 21 after the preliminary response.

The corporate urges isolating agentic options from common searching and requiring express person affirmation for delicate actions. As agentic browsers achieve traction, specialists name for industry-wide safeguards.

Courageous is exploring options by way of its analysis staff and plans to roll out safe AI options for its 100 million customers. Till then, customers ought to method these instruments cautiously, particularly with logged-in classes.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Browser, Comet, Feature, Inject, Malicious, Perplexitys, Prompts, Screenshot, Vulnerability

Post navigation

Previous Post: AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk
Next Post: Russian Government Now Actively Managing Cybercrime Groups: Security Firm

Related Posts

Microsoft Azure Faces Global Outage Affecting Services Worldwide Microsoft Azure Faces Global Outage Affecting Services Worldwide Cyber Security News
Hackers Attacking Fortinet SSL VPN Under Attack From 780 unique IPs Hackers Attacking Fortinet SSL VPN Under Attack From 780 unique IPs Cyber Security News
F5 Addresses Critical Security Flaws in BIG-IP and NGINX F5 Addresses Critical Security Flaws in BIG-IP and NGINX Cyber Security News
Microsoft’s AppLocker Flaw Allows Malicious Apps to Run and Bypass Restrictions Microsoft’s AppLocker Flaw Allows Malicious Apps to Run and Bypass Restrictions Cyber Security News
Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User Cyber Security News
Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated Attacks Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News