Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity’s agentic AI browser Comet by embedding malicious prompts within a seemingly innocuous link to siphon sensitive data, including from connected services, like email and calendar.
The sneaky prompt injection attack plays out in the form of a malicious link that, when clicked, triggers the Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity’s agentic AI browser Comet by embedding malicious prompts within a seemingly innocuous link to siphon sensitive data, including from connected services, like email and calendar.
The sneaky prompt injection attack plays out in the form of a malicious link that, when clicked, triggers the
- CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief The Hacker [email protected] (The Hacker News)
- Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day The Hacker [email protected] (The Hacker News)
- Scattered Lapsus$ Hunters Returns With Salesforce Leak Site darkreadingRob Wright
- Dutch Authorities Arrest Two Teens for Alleged Pro-Russian Espionage darkreadingKristina Beek
- Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer The Hacker [email protected] (The Hacker News)
- The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)by Tech Jacks
- Tips and Tricks to Enhance Your Incident Response Proceduresby Tech Jacks
- Building a Security Roadmap for Your Company: Strategic Precision for Modern Enterprises by Tech Jacks
- The Power of Policy: How Creating Strong Standard Operating Procedures Expedites Security Initiativesby Tech Jacks
- Building a Future-Proof SOC: Strategies for CISOs and Infosec Leaders by Tech Jacks
- Security Gate Keeping – Annoying – Unhelpfulby Tech Jacks
- The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)
Leave A Reply