Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in Perplexity’s Comet Browser Exploited

Critical Flaw in Perplexity’s Comet Browser Exploited

Posted on March 4, 2026 By CWS

A newly discovered vulnerability in Perplexity’s Comet browser poses serious security risks, according to findings from Zenity Labs. Dubbed ‘PerplexedBrowser’, this flaw enables attackers to exploit Comet’s AI agent by using a seemingly harmless Google Calendar invite to exfiltrate sensitive data.

Understanding the Exploit

This zero-click vulnerability manipulates Comet’s handling of meeting invites. When users prompt the browser to manage an invite, the attack seamlessly blends malicious content with legitimate requests. The concealed payload, hidden under whitespace in the invite, tricks the browser into executing unauthorized commands.

The attack initiates when an attacker sends a realistic Google Calendar invite. Hidden within the invite are fake HTML elements that mimic Comet’s internal instructions. Upon acceptance, these elements merge with the user’s action, triggering a sequence of harmful operations.

Implications for Users

The impact of this exploit is significant. By coercing Comet to visit an attacker-controlled site, secondary instructions, cleverly disguised in Hebrew, bypass English-centric security protocols. This results in unauthorized access to local files and sensitive API keys.

Moreover, if a user has an active 1Password extension, the browser can access and potentially alter stored credentials. Although multi-factor authentication offers some protection, individual data still faces exposure.

Ongoing Security Concerns

This incident marks the sixth major security issue for Comet since its debut in July 2025. Previous vulnerabilities, such as CometJacking and prompt injection attacks, highlight ongoing structural weaknesses.

Zenity Labs reported this vulnerability in October 2025. Despite efforts, it took Perplexity four months to implement a full fix. Experts like Zenity CTO Michael Bargury and AI security authority Simon Willison warn that these issues stem from inherent flaws in agentic systems, making them challenging to resolve.

To mitigate risks, users are advised to maintain tight security on password managers and restrict agent access to sensitive areas. For continuous updates, follow us on Google News, LinkedIn, and X, and contact us to share your cybersecurity stories.

Cyber Security News Tags:1Password, agentic systems, AI security, browser security, Comet browser, Cybersecurity, data exfiltration, Perplexity, Vulnerability, Zenity Labs

Post navigation

Previous Post: JetStream Debuts with $34M to Enhance AI Security
Next Post: LastPass Alerts Users to Phishing Threat

Related Posts

20 Best Endpoint Management Tools 20 Best Endpoint Management Tools Cyber Security News
17,000+ Fake News Websites Caught Promoting Investment Frauds 17,000+ Fake News Websites Caught Promoting Investment Frauds Cyber Security News
New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers Cyber Security News
Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence Cyber Security News
Microsoft Investigating Boot Failure Issues With Windows 11, version 25H2 Following January Update Microsoft Investigating Boot Failure Issues With Windows 11, version 25H2 Following January Update Cyber Security News
Massive IPTV Hosted Across More Than 1,000 Domains and Over 10,000 IP Addresses Massive IPTV Hosted Across More Than 1,000 Domains and Over 10,000 IP Addresses Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Coruna Exploit Kit Targets iOS 13-17.2.1 with 23 Exploits
  • VoidLink Malware Targets Kubernetes and Cloud Systems
  • LastPass Alerts Users to Phishing Threat
  • Critical Flaw in Perplexity’s Comet Browser Exploited
  • JetStream Debuts with $34M to Enhance AI Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Coruna Exploit Kit Targets iOS 13-17.2.1 with 23 Exploits
  • VoidLink Malware Targets Kubernetes and Cloud Systems
  • LastPass Alerts Users to Phishing Threat
  • Critical Flaw in Perplexity’s Comet Browser Exploited
  • JetStream Debuts with $34M to Enhance AI Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News