Close Menu
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
X (Twitter) Instagram Threads LinkedIn WhatsApp
Trending
  • Cognizant TriZetto Breach Exposes Data of 3.4M Patients
  • AI-Assisted Penetration Testing with Kali Linux: Claude AI and MCP Transform Ethical Hacking
  • Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets
  • Perplexity Comet Browser Vulnerability Exploited via Calendar Invite
  • Android Security Update Fixes 129 Flaws, Zero-Day
  • AI-Powered Cyber Attacks Surge 89% in 2025 Crisis Breakouts
  • Claude Distillation Attacks: 16M API Exchanges Exposed
  • Google Antigravity Suspension Hits OpenClaw Users
Monday, March 9
Cyber infos
X (Twitter) LinkedIn WhatsApp
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
Cyber infos
Cyber news

Perplexity Comet Vulnerability: Hidden Prompt Injection Puts AI Browser Users at Risk

A screenshot shouldn’t be a security threat — but in AI browsers, even pixels can turn dangerous.
V DiwaharBy V DiwaharOctober 24, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn WhatsApp Copy Link
Share
Facebook Twitter Pinterest Threads Copy Link

When a new browser promises smarter AI-powered features, most of us get excited. But with that innovation often comes a new kind of risk. That’s exactly what happened with the recent Perplexity Comet vulnerability, a flaw that lets attackers hide commands inside screenshots — yes, actual images — and trick the browser into doing things users never intended. This discovery feels like something straight out of a sci-fi story, but it’s very real, and it’s another reminder that we’re still figuring out the limits of AI browsers.

Table of Contents hide
1 How It All Started
2 The Sneaky Technique Behind It
3 Why It Matters So Much
4 What Brave Researchers Found
5 Not the First of Its Kind
6 Why Usual Defenses Don’t Work
7 Who Could Be Affected
8 What’s Being Done About It
9 Experts Are Concerned
10 How Users Can Stay Safe
11 Final thoughts

How It All Started

The issue first came to light on October 21, 2025, when researchers from Brave shared their findings about a serious bug in Perplexity AI’s Comet browser. The tool’s screenshot feature — meant to help users ask questions about web pages — turned out to be a security hole. The Perplexity Comet vulnerability shows how easily hackers can slip malicious text into images and make the browser obey invisible commands.

The Sneaky Technique Behind It

Here’s where things get clever — and dangerous. Attackers hide nearly invisible words in an image, using faint colors that blend right into the background. When a user takes a screenshot, Comet’s OCR system reads this hidden text and passes it to the large language model (LLM). From there, the AI thinks it’s following a user’s instruction, when in reality, it’s carrying out a hacker’s command. That’s what makes the Perplexity Comet vulnerability so unsettling — it’s an attack that rides in quietly, right through a normal-looking screenshot.

Why It Matters So Much

If this sounds like a small technical glitch, it’s not. The flaw gives attackers a way to exploit the very trust users place in AI. Since Comet AI can perform actions on your behalf, a single malicious screenshot could cause serious damage. Think of it as someone whispering a dangerous command in the AI’s ear while you’re distracted — that’s how subtle this attack can be. From phishing and data theft to unauthorized account actions, the potential fallout of the Perplexity Comet vulnerability is huge.

What Brave Researchers Found

The discovery came from Brave’s own security team, led by Artem Chaikin and Shivan Kaul Sahib. They tested the exploit in a controlled environment and showed how quickly it could override user intent. It was part of their continuing research into agentic browsers — those that act on a user’s behalf. Their demo proved one unsettling point: when AI interprets data blindly, even harmless features can become dangerous.

Not the First of Its Kind

This isn’t the first time an AI browser has been caught off guard. The Perplexity Comet vulnerability follows another earlier flaw reported by Brave, and similar issues have popped up in browsers like Fellou. These repeated incidents point to a growing pattern — AI tools that interact too freely with the web can be tricked by cleverly disguised input. It’s a systemic problem, not just a one-off mistake.

Why Usual Defenses Don’t Work

Traditional web security measures, like the same-origin policy, don’t protect against this kind of problem. That’s because the Perplexity Comet vulnerability doesn’t rely on normal code execution or network exploits. Instead, it manipulates how AI reads and processes visual data. It’s a reminder that we need a new kind of security thinking — one designed for AI-powered systems.

Who Could Be Affected

If you use Comet for browsing while logged into your bank, email, or cloud storage, you’re at risk. Even something as simple as taking a screenshot of an online forum could trigger a hidden command. The Perplexity Comet vulnerability shows how easily hackers could reach across domains and use innocent actions to hijack AI behavior.

What’s Being Done About It

Brave reported the issue to Perplexity AI on October 1, giving them time to respond before making it public. The company also urged all browser developers to isolate agentic features from normal browsing and add extra confirmation steps before any AI-driven action. Those safeguards might seem small, but they could prevent massive damage in the future. For now, Perplexity AI hasn’t released full technical details, likely to give users time to update and patch their browsers.

Experts Are Concerned

Cybersecurity professionals across the industry have taken notice. A Malwarebytes report even mentioned that simple AI summarization tools could lead to data leaks and financial loss. The Perplexity Comet vulnerability adds fuel to that warning — AI tools, when given too much freedom, can be manipulated in ways we haven’t fully prepared for. The takeaway? Smart doesn’t always mean safe.

How Users Can Stay Safe

Until fixes are rolled out, it’s smart to be cautious. Don’t take screenshots of untrusted pages. Avoid using AI features while logged into sensitive accounts. Disable experimental “agent” modes unless you fully understand how they work. These small steps can go a long way in keeping you safe from prompt injection or similar attacks. Staying alert is your best defense until browser makers catch up.

Final thoughts

At its core, the Perplexity Comet vulnerability shows how something as harmless as a screenshot can become a hacker’s weapon. As AI takes on a bigger role in our daily browsing, we need smarter safety nets and more responsible design choices. The technology is powerful — but without the right precautions, it can easily turn against us. So, next time your AI browser asks to “help,” make sure it’s not helping someone else instead.

Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleMeta Launches New Tools to Protect Messenger and WhatsApp Users from Scammers
Next Article Cybersecurity Newsletter Weekly – October 20 -26, 2025
V Diwahar
  • Website
  • LinkedIn

V Diwahar is a final-year B.E Cybersecurity student, independent security researcher, and founder of CyberInfos.in an - global cybersecurity analysis blog delivering technical depth, expert threat intelligence, and actionable security guidance to readers across the US, UK, Europe, Asia, and beyond. With hands-on academic and practical experience in ethical hacking, network security, malware analysis, penetration testing, vulnerability research, and digital forensics, I brings a practitioner's perspective to every article going beyond headlines to analyse what vulnerabilities and breaches actually mean, who is genuinely at risk, and what every reader should do about it right now. Every article published on CyberInfos.in is built on verified technical research CVE details cross-referenced with nvd.nist.gov, attack mechanics explained using real tools and lab environments, and expert analysis that challenges official statements when the evidence demands it. I founded CyberInfos.in with a single mission: to fill the gap between generic press-release rewrites and inaccessible technical papers delivering cybersecurity analysis that is deep enough for security professionals, clear enough for business owners, and actionable enough for everyone.

Related Posts

PayPal Data Breach: 6-Month SSN Exposure Shocks Small Businesses

February 21, 2026
Read More

SmarterMail Vulnerabilities Actively Exploited in Ransomware Attacks

February 19, 2026
Read More

Dell RecoverPoint Zero-Day Vulnerability Exploited by Chinese Hackers Since Mid-2024

February 18, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber news

PayPal Data Breach: 6-Month SSN Exposure Shocks Small Businesses

February 21, 2026

SmarterMail Vulnerabilities Actively Exploited in Ransomware Attacks

February 19, 2026

Dell RecoverPoint Zero-Day Vulnerability Exploited by Chinese Hackers Since Mid-2024

February 18, 2026

UK Cyber Essentials Campaign Urges SMEs to Lock the Digital Door

February 17, 2026

Top 10

Top 10 Cybersecurity Resolutions Every User Should Make in 2026

January 1, 2026

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

mobile security

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026

PromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks

February 20, 2026

Google Is Finally Letting Users Change Gmail Address – Here’s How It Works

December 26, 2025

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Cognizant TriZetto Breach Exposes Data of 3.4M Patients

March 8, 2026

AI-Assisted Penetration Testing with Kali Linux: Claude AI and MCP Transform Ethical Hacking

March 6, 2026

Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets

March 5, 2026

Perplexity Comet Browser Vulnerability Exploited via Calendar Invite

March 4, 2026

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

We delivers trusted cybersecurity updates, expert analysis, and online safety tips. We help individuals and businesses understand cyber threats and protect their digital world with accurate, easy-to-read information.

Partners
White Hat Hub Partner
X (Twitter) LinkedIn WhatsApp
  • Contact us
  • Sitemaps
© 2026 Cyberinfos - All Rights are Reserved

Type above and press Enter to search. Press Esc to cancel.