Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in Perplexity’s Comet Browser Exploited

Critical Flaw in Perplexity’s Comet Browser Exploited

Posted on March 4, 2026 By CWS

A newly discovered vulnerability in Perplexity’s Comet browser poses serious security risks, according to findings from Zenity Labs. Dubbed ‘PerplexedBrowser’, this flaw enables attackers to exploit Comet’s AI agent by using a seemingly harmless Google Calendar invite to exfiltrate sensitive data.

Understanding the Exploit

This zero-click vulnerability manipulates Comet’s handling of meeting invites. When users prompt the browser to manage an invite, the attack seamlessly blends malicious content with legitimate requests. The concealed payload, hidden under whitespace in the invite, tricks the browser into executing unauthorized commands.

The attack initiates when an attacker sends a realistic Google Calendar invite. Hidden within the invite are fake HTML elements that mimic Comet’s internal instructions. Upon acceptance, these elements merge with the user’s action, triggering a sequence of harmful operations.

Implications for Users

The impact of this exploit is significant. By coercing Comet to visit an attacker-controlled site, secondary instructions, cleverly disguised in Hebrew, bypass English-centric security protocols. This results in unauthorized access to local files and sensitive API keys.

Moreover, if a user has an active 1Password extension, the browser can access and potentially alter stored credentials. Although multi-factor authentication offers some protection, individual data still faces exposure.

Ongoing Security Concerns

This incident marks the sixth major security issue for Comet since its debut in July 2025. Previous vulnerabilities, such as CometJacking and prompt injection attacks, highlight ongoing structural weaknesses.

Zenity Labs reported this vulnerability in October 2025. Despite efforts, it took Perplexity four months to implement a full fix. Experts like Zenity CTO Michael Bargury and AI security authority Simon Willison warn that these issues stem from inherent flaws in agentic systems, making them challenging to resolve.

To mitigate risks, users are advised to maintain tight security on password managers and restrict agent access to sensitive areas. For continuous updates, follow us on Google News, LinkedIn, and X, and contact us to share your cybersecurity stories.

Cyber Security News Tags:1Password, agentic systems, AI security, browser security, Comet browser, Cybersecurity, data exfiltration, Perplexity, Vulnerability, Zenity Labs

Post navigation

Previous Post: JetStream Debuts with $34M to Enhance AI Security
Next Post: LastPass Alerts Users to Phishing Threat

Related Posts

Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users Cyber Security News
Blockchain for Cybersecurity Real-World Applications and Limits Blockchain for Cybersecurity Real-World Applications and Limits Cyber Security News
Microsoft Teams New feature Allows Users to Flag Malicious Calls Microsoft Teams New feature Allows Users to Flag Malicious Calls Cyber Security News
European Commission Thwarts Cyber-Attack on Mobile Data European Commission Thwarts Cyber-Attack on Mobile Data Cyber Security News
Conducting Risk Assessments That Drive Business Value Conducting Risk Assessments That Drive Business Value Cyber Security News
GitLab Security Update – Patch for Multiple Vulnerabilities in Community and Enterprise Edition GitLab Security Update – Patch for Multiple Vulnerabilities in Community and Enterprise Edition Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI-Driven Malware Targets Iraqi Officials: New Threats Emerge
  • Zurich’s $11 Billion Acquisition to Dominate Cyberinsurance
  • Coruna Exploit Kit Targets iOS 13-17.2.1 with 23 Exploits
  • VoidLink Malware Targets Kubernetes and Cloud Systems
  • LastPass Alerts Users to Phishing Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI-Driven Malware Targets Iraqi Officials: New Threats Emerge
  • Zurich’s $11 Billion Acquisition to Dominate Cyberinsurance
  • Coruna Exploit Kit Targets iOS 13-17.2.1 with 23 Exploits
  • VoidLink Malware Targets Kubernetes and Cloud Systems
  • LastPass Alerts Users to Phishing Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News