Vulnerabilities Trigger Alarm
AI Browsers Under Siege: Perplexity AI’s Comet Victim of Major Security Flaw!
Brave Software and Perplexity AI are in the spotlight as major security vulnerabilities have been uncovered in Perplexity AI's Comet browser extension. The issue? Indirect prompt injection attacks are exposing users to significant risk by allowing embedded hidden instructions within webpage content to execute harmful commands. Despite Perplexity's efforts to address these vulnerabilities, attackers continue to bypass defenses, posing a systemic challenge across AI‑powered browsers.
Introduction to Security Vulnerabilities in AI Browsers
Understanding Indirect Prompt Injection Attacks
Impact of Attacks on Perplexity AI’s Comet Browser
Current Mitigation Efforts and Challenges
Systemic Challenges Across AI‑Powered Browsers
Proposed Security Enhancements for AI Browsers
Public Reactions and Concerns
Future Implications and Industry Perspectives
Conclusion: Caution and Future Directions
Sources
Related News
May 20, 2026
Google Fires Back at Anthropic Mythos With CodeMender Security Agent
Google announced CodeMender API access at I/O 2026, positioning its AI code-security agent as a direct response to Anthropic's Mythos. The move signals that cybersecurity — not chatbots — is becoming the key revenue battleground for frontier AI labs racing toward IPOs.
May 19, 2026
Anthropic to Brief Global Financial Watchdog on Mythos Cyber Flaws
Anthropic is preparing to brief the Financial Stability Board — the G20's financial stability watchdog — on cybersecurity vulnerabilities its Mythos model has uncovered in the global banking system. It marks the first coordinated global regulatory response to a single AI model's capabilities.
May 18, 2026
Pentagon Deploys Anthropic Mythos AI for Cybersecurity While Planning to Cut Ties
The Pentagon is deploying Anthropic's unreleased Claude Mythos model for cybersecurity defense under Project Glasswing — even as it plans to phase out Anthropic's other products. Japan is also crafting cyberdefense guidelines in response. The model can find decades-old vulnerabilities autonomously, marking a new era in AI-powered security.