Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in Perplexity’s Comet Browser Exploited

Critical Flaw in Perplexity’s Comet Browser Exploited

Posted on March 4, 2026 By CWS

A newly discovered vulnerability in Perplexity’s Comet browser poses serious security risks, according to findings from Zenity Labs. Dubbed ‘PerplexedBrowser’, this flaw enables attackers to exploit Comet’s AI agent by using a seemingly harmless Google Calendar invite to exfiltrate sensitive data.

Understanding the Exploit

This zero-click vulnerability manipulates Comet’s handling of meeting invites. When users prompt the browser to manage an invite, the attack seamlessly blends malicious content with legitimate requests. The concealed payload, hidden under whitespace in the invite, tricks the browser into executing unauthorized commands.

The attack initiates when an attacker sends a realistic Google Calendar invite. Hidden within the invite are fake HTML elements that mimic Comet’s internal instructions. Upon acceptance, these elements merge with the user’s action, triggering a sequence of harmful operations.

Implications for Users

The impact of this exploit is significant. By coercing Comet to visit an attacker-controlled site, secondary instructions, cleverly disguised in Hebrew, bypass English-centric security protocols. This results in unauthorized access to local files and sensitive API keys.

Moreover, if a user has an active 1Password extension, the browser can access and potentially alter stored credentials. Although multi-factor authentication offers some protection, individual data still faces exposure.

Ongoing Security Concerns

This incident marks the sixth major security issue for Comet since its debut in July 2025. Previous vulnerabilities, such as CometJacking and prompt injection attacks, highlight ongoing structural weaknesses.

Zenity Labs reported this vulnerability in October 2025. Despite efforts, it took Perplexity four months to implement a full fix. Experts like Zenity CTO Michael Bargury and AI security authority Simon Willison warn that these issues stem from inherent flaws in agentic systems, making them challenging to resolve.

To mitigate risks, users are advised to maintain tight security on password managers and restrict agent access to sensitive areas. For continuous updates, follow us on Google News, LinkedIn, and X, and contact us to share your cybersecurity stories.

Cyber Security News Tags:1Password, agentic systems, AI security, browser security, Comet browser, Cybersecurity, data exfiltration, Perplexity, Vulnerability, Zenity Labs

Post navigation

Previous Post: JetStream Debuts with $34M to Enhance AI Security
Next Post: LastPass Alerts Users to Phishing Threat

Related Posts

Critical Chaos Mesh Vulnerabilities Let Attackers Takeover Kubernetes Cluster Critical Chaos Mesh Vulnerabilities Let Attackers Takeover Kubernetes Cluster Cyber Security News
Langchain SSRF Vulnerability Threatens Internal Security Langchain SSRF Vulnerability Threatens Internal Security Cyber Security News
Securing IoT Devices in the Enterprise Challenges and Solutions Securing IoT Devices in the Enterprise Challenges and Solutions Cyber Security News
Surge in Attacks Targeting RSC-Enabled Services Worldwide Surge in Attacks Targeting RSC-Enabled Services Worldwide Cyber Security News
Linux Kernel 6.18-rc1 Released With Extensive Updates Following a Steady Merge Window Linux Kernel 6.18-rc1 Released With Extensive Updates Following a Steady Merge Window Cyber Security News
Fake Zoom Website Exploits 1,437 Users with Spyware Fake Zoom Website Exploits 1,437 Users with Spyware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark