Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

The Kill Chain Is Obsolete When Your AI Agent Becomes the Threat

March 25, 2026

RedLine Infostealer Conspirator Extradited to U.S.

March 25, 2026

CyberTech Daily: Top News & Insights

March 25, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » SquareX and Perplexity Clash Over Alleged Comet Browser Flaw
Cybercrime and Ransomware

SquareX and Perplexity Clash Over Alleged Comet Browser Flaw

Staff WriterBy Staff WriterNovember 21, 2025No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Quick Takeaways

  1. SquareX identified a critical vulnerability in Perplexity’s Comet AI browser involving hidden extensions ( Analytics and Agentic) that could allow attackers to execute commands on a victim’s device, potentially leading to ransomware or data theft.
  2. The attack requires significant human intervention, such as hijacking extensions via XSS or MitM attacks, but demonstrates the inherent risks in the MCP API used by Comet.
  3. Perplexity disputes the severity, claiming the vulnerability is theoretical, requiring targeted phishing and human error, and stating users are prompted for permissions; they have implemented some security measures.
  4. SquareX’s research aimed to highlight potential risks of the MCP API, noting that their demonstration showed immediate ransomware execution without user prompt, emphasizing the need for heightened security awareness.

What’s the Problem?

SquareX, a browser security firm, uncovered a potentially severe vulnerability in Perplexity’s Comet AI browser, centered around its Model Context Protocol (MCP) API and two hidden extensions—Analytics and Agentic—that facilitate automation and data collection. Their research suggests that if an attacker can hijack the ‘perplexity.ai’ subdomains or compromise the Agentic extension—possible through methods like cross-site scripting (XSS) or man-in-the-middle (MitM) attacks—they could exploit the MCP API to execute commands on a user’s device without explicit permission, potentially leading to ransomware deployment, unauthorized monitoring, or data theft. Although Perplexity disputes these findings, claiming the attack demonstrations involve significant human intervention and do not pose an actual security threat, SquareX emphasizes that their experiments showed ransomware could be activated immediately after the browser was reopened, highlighting inherent risks in the system’s permissions. The conflict underscores ongoing concerns about AI browser security, with SquareX applauding the company’s recent patches but remaining cautious about potential vulnerabilities that malicious actors could exploit with less user involvement.

Risks Involved

The conflict between SquareX and Perplexity over a suspected vulnerability in the Comet browser highlights a critical risk that any business utilizing similar web technologies faces: security breaches and unreliable digital infrastructure can lead to severe operational disruptions, loss of customer trust, and potential legal liabilities. When vulnerabilities are exposed or disputed, it undermines confidence in the software and services relied upon daily, leaving organizations vulnerable to cyberattacks, data leaks, and reputational damage. In an interconnected economy where digital tools underpin transactions, communications, and data management, such disputes serve as a stark reminder that neglecting cybersecurity diligence can translate into tangible, material harm—threatening financial stability, strategic growth, and competitive positioning for any enterprise.

Possible Actions

Timely remediation in the context of cybersecurity, especially with emerging vulnerabilities such as the alleged Comet Browser weakness, is crucial for maintaining organizational integrity and safeguarding sensitive data. Prompt actions can mitigate potential exploitation, prevent significant disruptions, and preserve stakeholder trust.

Assessment
Conduct a comprehensive vulnerability assessment to verify the existence and scope of the suspected Comet Browser flaw.

Containment
Isolate affected systems to prevent the spread of potential exploits while further analysis is underway.

Notification
Inform internal stakeholders and, if applicable, external regulatory bodies about the identified vulnerability in accordance with organizational policies.

Patch Management
Apply official patches or security updates released by the browser vendor promptly once verified.

Configuration
Adjust system and browser configurations to disable compromised features and enhance security settings.

Monitoring
Implement continuous monitoring to detect any suspicious activity related to the vulnerability and ensure remediation effectiveness.

User Training
Educate users about the vulnerability’s risks and encourage best security practices to reduce the chance of exploitation.

Review & Document
Maintain detailed records of the incident response efforts and review the process to improve future vulnerability management.

Continue Your Cyber Journey

Stay informed on the latest Threat Intelligence and Cyberattacks.

Understand foundational security frameworks via NIST CSF on Wikipedia.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1cyberattack-v1-multisource

AI browser CISO Update Comet controversy cyber risk cybercrime Cybersecurity Featured MX1 Perplexity risk management SquareX vulnerability
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSalesforce Flags Unauthorized Access Through Gainsight OAuth
Next Article Legacy Web Forms: The Hidden Threat to Government Data Security
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

RedLine Infostealer Conspirator Extradited to U.S.

March 25, 2026

Pay2Key Ransomware Targets Organizations, Virtualization Hosts, and Cloud Workloads

March 25, 2026

New Research Reveals How Infostealer Infections Hit Dark Web in 48 Hours

March 25, 2026

Comments are closed.

Latest Posts

RedLine Infostealer Conspirator Extradited to U.S.

March 25, 2026

Pay2Key Ransomware Targets Organizations, Virtualization Hosts, and Cloud Workloads

March 25, 2026

New Research Reveals How Infostealer Infections Hit Dark Web in 48 Hours

March 25, 2026

500GB Stolen from Namibia Airports: A Wake-Up Call for Aviation Security

March 25, 2026
Don't Miss

RedLine Infostealer Conspirator Extradited to U.S.

By Staff WriterMarch 25, 2026

Top Highlights An Armenian man, Hambardzum Minasyan, was extradited to the US and appeared in…

Pay2Key Ransomware Targets Organizations, Virtualization Hosts, and Cloud Workloads

March 25, 2026

New Research Reveals How Infostealer Infections Hit Dark Web in 48 Hours

March 25, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • The Kill Chain Is Obsolete When Your AI Agent Becomes the Threat
  • RedLine Infostealer Conspirator Extradited to U.S.
  • CyberTech Daily: Top News & Insights
  • Pay2Key Ransomware Targets Organizations, Virtualization Hosts, and Cloud Workloads
  • LeakBase Admin Nabbed in Russia for Massive Credential Marketplace
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The Kill Chain Is Obsolete When Your AI Agent Becomes the Threat

March 25, 2026

RedLine Infostealer Conspirator Extradited to U.S.

March 25, 2026

CyberTech Daily: Top News & Insights

March 25, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202629 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202515 Views

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.