Advertisement

large language models

Researchers at Zenity Labs discovered flaws affecting multiple AI browsers, including Perplexity’s Comet. Before being patched, an attacker could exploit them via a legitimate calendar invite, using a prompt injection to force the AI browser to act against its user. (Image via Getty)

Researchers discover suite of agentic AI browser vulnerabilities

Through a simple calendar invite, AI browsers like Comet can be directed to access local file systems, browse directories, open and read files, and exfiltrate data.
The Claude AI logo is displayed on the screen of a smartphone placed on a reflective surface onto which lines of computer code are projected. Following the release of Claude Opus 4.6 on February 5, Anthropic continues to challenge its main competitors in the generative AI market in Creteil, France, on February 6, 2026. (Photo by Samuel Boivin/NurPhoto via Getty Images)

Anthropic rolls out embedded security scanning for Claude 

The feature, currently limited to a small group of testers, will provide an easy-to-use feature that scans AI-generated code and offers up patching solutions. 
Advertisement
In this photo illustration, a person holds a smartphone showing the Introducing GPT-5 interface in the ChatGPT app, with text describing the model’s capabilities, in front of a blurred OpenAI logo on August 9, 2025 in Chongqing, China. (Photo illustration by Cheng Xin/Getty Images)

Guess what else GPT-5 is bad at? Security

OpenAI and Microsoft have said that GPT-5 is one of their safest and secure models out of the box yet. An AI red-teamer called its performance “terrible.” 
Advertisement
Advertisement