Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI Browsers Vulnerable to Phishing Attacks: A Security Concern

AI Browsers Vulnerable to Phishing Attacks: A Security Concern

Posted on March 11, 2026 By CWS

Artificial intelligence (AI) browsers are being targeted by cybercriminals, who have managed to exploit their vulnerabilities to execute phishing scams within a matter of minutes. Recent findings by security firm Guardio highlight the susceptibility of these browsers, including Perplexity’s Comet AI, to such attacks.

The Mechanics of AI Browser Exploitation

AI-powered browsers, which autonomously navigate and perform tasks across various websites, are at risk of being manipulated by malicious actors. Guardio’s research reveals how the reasoning capabilities of these browsers can be turned against them, reducing their security measures and paving the way for phishing scams. By intercepting communications between the browser and AI services, attackers can use a Generative Adversarial Network (GAN) to deceive the browser into executing phishing activities.

Security researcher Shaked Chen describes this vulnerability as ‘Agentic Blabbering,’ where the browser exposes its internal decision-making processes. This transparency allows attackers to train their scams effectively, refining them until the AI browser complies with their malicious intents.

Innovative Phishing Techniques

The exploitation of AI browsers is not new, building on previous methods like VibeScamming and Scamlexity. These techniques involve tricking AI browsers into generating deceptive pages or performing harmful actions through hidden prompt injections. Unlike traditional scams targeting human users, these attacks focus on deceiving the AI itself, creating a shift in the threat landscape.

The ultimate goal is to create a ‘scamming machine’ that perfects phishing pages to bypass browser defenses. Once tailored to one browser, the scam becomes effective against all users of that specific AI model, marking a significant evolution in phishing strategies.

Addressing the Security Challenges

Recent demonstrations by Trail of Bits and Zenity Labs further underscore the vulnerabilities of AI browsers like Comet. These include prompt injection techniques capable of extracting private data from services such as Gmail and exploiting browser assistants to exfiltrate sensitive information.

Although some vulnerabilities, codenamed PerplexedBrowser, have been addressed, the issue remains a pressing concern. Prompt injection attacks, which blend user requests with attacker commands, pose a persistent security challenge for large language models and their integration into enterprise systems.

Despite efforts to mitigate these risks through automated discovery and adversarial training, eliminating such vulnerabilities entirely may not be feasible, as stated by OpenAI in late 2025. As AI browsers become more prevalent, the need for robust safeguards and continuous monitoring becomes increasingly critical.

In conclusion, as AI browsers continue to evolve, so do the tactics of cybercriminals seeking to exploit their weaknesses. The ongoing battle between security measures and malicious actors highlights the importance of vigilance and innovation in cybersecurity.

The Hacker News Tags:Agentic Blabbering, AI browsers, AI security, browser vulnerabilities, Comet AI, Cybersecurity, Generative Adversarial Network, Guardio, phishing attacks, prompt injection, Scamlexity, Trail of Bits, vibe coding, Zenity Labs

Post navigation

Previous Post: Stryker Faces Cyber Breach: Data Erased Globally
Next Post: AI Threat Detection Startup Scanner Secures $22M Funding

Related Posts

Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS The Hacker News
Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools The Hacker News
North Korean Hackers Exploit npm Packages for Malware North Korean Hackers Exploit npm Packages for Malware The Hacker News
3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026 3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026 The Hacker News
Why Early Threat Detection Is a Must for Long-Term Business Growth Why Early Threat Detection Is a Must for Long-Term Business Growth The Hacker News
India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom Fraud India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom Fraud The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Agent Deletes Database in Seconds: Security Alert
  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Agent Deletes Database in Seconds: Security Alert
  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark