Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI Browsers Vulnerable to Phishing Attacks: A Security Concern

AI Browsers Vulnerable to Phishing Attacks: A Security Concern

Posted on March 11, 2026 By CWS

Artificial intelligence (AI) browsers are being targeted by cybercriminals, who have managed to exploit their vulnerabilities to execute phishing scams within a matter of minutes. Recent findings by security firm Guardio highlight the susceptibility of these browsers, including Perplexity’s Comet AI, to such attacks.

The Mechanics of AI Browser Exploitation

AI-powered browsers, which autonomously navigate and perform tasks across various websites, are at risk of being manipulated by malicious actors. Guardio’s research reveals how the reasoning capabilities of these browsers can be turned against them, reducing their security measures and paving the way for phishing scams. By intercepting communications between the browser and AI services, attackers can use a Generative Adversarial Network (GAN) to deceive the browser into executing phishing activities.

Security researcher Shaked Chen describes this vulnerability as ‘Agentic Blabbering,’ where the browser exposes its internal decision-making processes. This transparency allows attackers to train their scams effectively, refining them until the AI browser complies with their malicious intents.

Innovative Phishing Techniques

The exploitation of AI browsers is not new, building on previous methods like VibeScamming and Scamlexity. These techniques involve tricking AI browsers into generating deceptive pages or performing harmful actions through hidden prompt injections. Unlike traditional scams targeting human users, these attacks focus on deceiving the AI itself, creating a shift in the threat landscape.

The ultimate goal is to create a ‘scamming machine’ that perfects phishing pages to bypass browser defenses. Once tailored to one browser, the scam becomes effective against all users of that specific AI model, marking a significant evolution in phishing strategies.

Addressing the Security Challenges

Recent demonstrations by Trail of Bits and Zenity Labs further underscore the vulnerabilities of AI browsers like Comet. These include prompt injection techniques capable of extracting private data from services such as Gmail and exploiting browser assistants to exfiltrate sensitive information.

Although some vulnerabilities, codenamed PerplexedBrowser, have been addressed, the issue remains a pressing concern. Prompt injection attacks, which blend user requests with attacker commands, pose a persistent security challenge for large language models and their integration into enterprise systems.

Despite efforts to mitigate these risks through automated discovery and adversarial training, eliminating such vulnerabilities entirely may not be feasible, as stated by OpenAI in late 2025. As AI browsers become more prevalent, the need for robust safeguards and continuous monitoring becomes increasingly critical.

In conclusion, as AI browsers continue to evolve, so do the tactics of cybercriminals seeking to exploit their weaknesses. The ongoing battle between security measures and malicious actors highlights the importance of vigilance and innovation in cybersecurity.

The Hacker News Tags:Agentic Blabbering, AI browsers, AI security, browser vulnerabilities, Comet AI, Cybersecurity, Generative Adversarial Network, Guardio, phishing attacks, prompt injection, Scamlexity, Trail of Bits, vibe coding, Zenity Labs

Post navigation

Previous Post: Stryker Faces Cyber Breach: Data Erased Globally
Next Post: AI Threat Detection Startup Scanner Secures $22M Funding

Related Posts

Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds The Hacker News
Why Default Passwords Must Go Why Default Passwords Must Go The Hacker News
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms The Hacker News
Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks The Hacker News
Google Halts Major Cyber Espionage Campaign Targeting 53 Entities Google Halts Major Cyber Espionage Campaign Targeting 53 Entities The Hacker News
Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Senate Approves Joshua Rudd for NSA and Cyber Command
  • Iran’s Internet Shutdown Enters 10th Day, Traffic Severely Restricted
  • AI Threat Detection Startup Scanner Secures $22M Funding
  • AI Browsers Vulnerable to Phishing Attacks: A Security Concern
  • Stryker Faces Cyber Breach: Data Erased Globally

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Senate Approves Joshua Rudd for NSA and Cyber Command
  • Iran’s Internet Shutdown Enters 10th Day, Traffic Severely Restricted
  • AI Threat Detection Startup Scanner Secures $22M Funding
  • AI Browsers Vulnerable to Phishing Attacks: A Security Concern
  • Stryker Faces Cyber Breach: Data Erased Globally

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News