Close Menu
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
X (Twitter) Instagram Threads LinkedIn WhatsApp
Trending
  • 3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk
  • ClawdBot AI (Moltbot) Security Risks: Autonomous AI Agent Threats
  • Fake Moltbot VS Code Extension Malware Found in Marketplace Attack
  • Meta Premium Subscriptions: Instagram, Facebook & WhatsApp AI Plans
  • Malicious Chrome Extensions Driving Chrome Web Store Phishing
  • Windows 11 Boot Failure January 2026 Update: Microsoft Investigates
  • Cybersecurity Weekly Report: Jan 18-24 Threats
  • 149 Million Passwords Exposed Online in Massive Infostealer Malware Leak
Tuesday, February 3
Cyber infosCyber infos
X (Twitter) Instagram LinkedIn WhatsApp
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
Cyber infosCyber infos
Cyber news

Perplexity Comet Vulnerability: Hidden Prompt Injection Puts AI Browser Users at Risk

A screenshot shouldn’t be a security threat — but in AI browsers, even pixels can turn dangerous.
Cyber infosBy Cyber infosOctober 24, 2025No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Email WhatsApp Copy Link
Follow Us
X (Twitter) Instagram LinkedIn WhatsApp Telegram Threads
Share
Facebook Twitter Pinterest Threads Copy Link

When a new browser promises smarter AI-powered features, most of us get excited. But with that innovation often comes a new kind of risk. That’s exactly what happened with the recent Perplexity Comet vulnerability, a flaw that lets attackers hide commands inside screenshots — yes, actual images — and trick the browser into doing things users never intended. This discovery feels like something straight out of a sci-fi story, but it’s very real, and it’s another reminder that we’re still figuring out the limits of AI browsers.

Table of Contents hide
1 How It All Started
2 The Sneaky Technique Behind It
3 Why It Matters So Much
4 What Brave Researchers Found
5 Not the First of Its Kind
6 Why Usual Defenses Don’t Work
7 Who Could Be Affected
8 What’s Being Done About It
9 Experts Are Concerned
10 How Users Can Stay Safe
11 Final thoughts

How It All Started

The issue first came to light on October 21, 2025, when researchers from Brave shared their findings about a serious bug in Perplexity AI’s Comet browser. The tool’s screenshot feature — meant to help users ask questions about web pages — turned out to be a security hole. The Perplexity Comet vulnerability shows how easily hackers can slip malicious text into images and make the browser obey invisible commands.

The Sneaky Technique Behind It

Here’s where things get clever — and dangerous. Attackers hide nearly invisible words in an image, using faint colors that blend right into the background. When a user takes a screenshot, Comet’s OCR system reads this hidden text and passes it to the large language model (LLM). From there, the AI thinks it’s following a user’s instruction, when in reality, it’s carrying out a hacker’s command. That’s what makes the Perplexity Comet vulnerability so unsettling — it’s an attack that rides in quietly, right through a normal-looking screenshot.

Why It Matters So Much

If this sounds like a small technical glitch, it’s not. The flaw gives attackers a way to exploit the very trust users place in AI. Since Comet AI can perform actions on your behalf, a single malicious screenshot could cause serious damage. Think of it as someone whispering a dangerous command in the AI’s ear while you’re distracted — that’s how subtle this attack can be. From phishing and data theft to unauthorized account actions, the potential fallout of the Perplexity Comet vulnerability is huge.

What Brave Researchers Found

The discovery came from Brave’s own security team, led by Artem Chaikin and Shivan Kaul Sahib. They tested the exploit in a controlled environment and showed how quickly it could override user intent. It was part of their continuing research into agentic browsers — those that act on a user’s behalf. Their demo proved one unsettling point: when AI interprets data blindly, even harmless features can become dangerous.

Not the First of Its Kind

This isn’t the first time an AI browser has been caught off guard. The Perplexity Comet vulnerability follows another earlier flaw reported by Brave, and similar issues have popped up in browsers like Fellou. These repeated incidents point to a growing pattern — AI tools that interact too freely with the web can be tricked by cleverly disguised input. It’s a systemic problem, not just a one-off mistake.

Why Usual Defenses Don’t Work

Traditional web security measures, like the same-origin policy, don’t protect against this kind of problem. That’s because the Perplexity Comet vulnerability doesn’t rely on normal code execution or network exploits. Instead, it manipulates how AI reads and processes visual data. It’s a reminder that we need a new kind of security thinking — one designed for AI-powered systems.

Who Could Be Affected

If you use Comet for browsing while logged into your bank, email, or cloud storage, you’re at risk. Even something as simple as taking a screenshot of an online forum could trigger a hidden command. The Perplexity Comet vulnerability shows how easily hackers could reach across domains and use innocent actions to hijack AI behavior.

What’s Being Done About It

Brave reported the issue to Perplexity AI on October 1, giving them time to respond before making it public. The company also urged all browser developers to isolate agentic features from normal browsing and add extra confirmation steps before any AI-driven action. Those safeguards might seem small, but they could prevent massive damage in the future. For now, Perplexity AI hasn’t released full technical details, likely to give users time to update and patch their browsers.

Experts Are Concerned

Cybersecurity professionals across the industry have taken notice. A Malwarebytes report even mentioned that simple AI summarization tools could lead to data leaks and financial loss. The Perplexity Comet vulnerability adds fuel to that warning — AI tools, when given too much freedom, can be manipulated in ways we haven’t fully prepared for. The takeaway? Smart doesn’t always mean safe.

How Users Can Stay Safe

Until fixes are rolled out, it’s smart to be cautious. Don’t take screenshots of untrusted pages. Avoid using AI features while logged into sensitive accounts. Disable experimental “agent” modes unless you fully understand how they work. These small steps can go a long way in keeping you safe from prompt injection or similar attacks. Staying alert is your best defense until browser makers catch up.

Final thoughts

At its core, the Perplexity Comet vulnerability shows how something as harmless as a screenshot can become a hacker’s weapon. As AI takes on a bigger role in our daily browsing, we need smarter safety nets and more responsible design choices. The technology is powerful — but without the right precautions, it can easily turn against us. So, next time your AI browser asks to “help,” make sure it’s not helping someone else instead.

Follow on X (Twitter) Follow on Instagram Follow on LinkedIn Follow on WhatsApp Follow on Threads
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleMeta Launches New Tools to Protect Messenger and WhatsApp Users from Scammers
Next Article Cybersecurity Newsletter Weekly – October 20 -26, 2025
Cyber infos
  • Website

Related Posts

3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk

January 30, 2026
Read More

ClawdBot AI (Moltbot) Security Risks: Autonomous AI Agent Threats

January 30, 2026
Read More

Windows 11 Boot Failure January 2026 Update: Microsoft Investigates

January 26, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber news

3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk

January 30, 2026

ClawdBot AI (Moltbot) Security Risks: Autonomous AI Agent Threats

January 30, 2026

Windows 11 Boot Failure January 2026 Update: Microsoft Investigates

January 26, 2026

149 Million Passwords Exposed Online in Massive Infostealer Malware Leak

January 25, 2026

Top 10

Top 10 Cybersecurity Resolutions Every User Should Make in 2026

January 1, 2026

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

mobile security

Google Is Finally Letting Users Change Gmail Address – Here’s How It Works

December 26, 2025

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Archives
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk

January 30, 2026

ClawdBot AI (Moltbot) Security Risks: Autonomous AI Agent Threats

January 30, 2026

Fake Moltbot VS Code Extension Malware Found in Marketplace Attack

January 29, 2026

Meta Premium Subscriptions: Instagram, Facebook & WhatsApp AI Plans

January 28, 2026

Malicious Chrome Extensions Driving Chrome Web Store Phishing

January 27, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

We delivers trusted cybersecurity updates, expert analysis, and online safety tips. We help individuals and businesses understand cyber threats and protect their digital world with accurate, easy-to-read information.

Partners
White Hat Hub Partner
X (Twitter) Instagram Pinterest LinkedIn WhatsApp Threads
  • Contact us
  • Sitemaps
© 2026 Cyberinfos - All Rights are Reserved

Type above and press Enter to search. Press Esc to cancel.