Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Researchers Warn of Security Gaps in AI Browsers
News

Researchers Warn of Security Gaps in AI Browsers

Team-CWDBy Team-CWDOctober 9, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new report by security researchers at SquareX Labs has identified several architectural security weaknesses in AI browsers, including Perplexity’s Comet.

The findings suggest that as browsers adopt artificial intelligence to automate user tasks, they may also introduce new forms of cyber-risk.

A New Generation of Browsers

AI browsers are designed to integrate AI assistants directly into the browsing experience, allowing users to search, summarize and even perform online actions through natural-language prompts.

Since Perplexity launched Comet in July, other companies – among them OpenAI, The Browser Company and Fellou AI – have followed with similar products. Major platforms such as Chrome and Edge have also outlined plans to add AI-driven capabilities.

According to SquareX, the growing use of AI browsers could mark a significant change in how people and organizations interact with the web.

However, the report notes that current browser architectures may not yet account for the security challenges posed by autonomous AI behavior.

Four key challenges

SquareX categorized the security issues into four main areas:

  • Malicious workflows: AI agents can be deceived by phishing or OAuth-based attacks that request excessive access permissions, potentially exposing email or cloud storage data

  • Prompt injection: Attackers may embed hidden instructions within trusted apps such as SharePoint or OneDrive, prompting AI agents to share data or insert harmful links

  • Malicious downloads: AI browsers can be directed to download disguised malware through manipulated search results

  • Trusted app misuse: Even legitimate business tools can be used to deliver unauthorized commands through AI-driven interactions

Read more on AI-driven cybersecurity research: AI Tops Cybersecurity Investment Priorities, PwC Finds 

Toward Stronger Safeguards

SquareX researchers emphasized that securing AI browsers will require collaboration between browser developers, enterprises and security vendors.

They observed that existing tools like SASE and EDR solutions have limited visibility into AI browser behavior, making it difficult to detect when actions are performed by an automated agent rather than a human user.

To mitigate these risks, the report recommends several steps:

  • Establishing agentic identity systems to differentiate between user and AI actions

  • Implementing data loss prevention (DLP) policies within browsers

  • Adding client-side file scanning to detect malicious downloads

  • Conducting extension risk assessments to identify unsafe or compromised add-ons

SquareX concluded that as AI capabilities become a standard part of web browsing, building security directly into these systems will be essential to prevent unintentional exposure of sensitive data.

Image credit: gguy / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew China-Linked Hacker Group Hits Governments With Stealth Malware
Next Article Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What is it, and how do I get it off my device?

September 11, 2025

Here’s what you should know

February 6, 2026

What parents should know to protect their children from doxxing

November 28, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.