Researchers Find Severe #Vulnerabilities in #AIBrowser

New research from the web browser company #Brave, should dampen the enthusiasm for the tech. In a report the company outlined glaring #securityflaws with Perplexity’s Comet Browser, which allows users to take screenshots on websites so a built-in AI can analyze them & answer questions. The screenshot feature can be a vector for an attack known as a prompt injection, in which a hacker delivers a hidden message to an AI to carry out harmful

Comet browser faces multiple security vulnerabilities from prompt injection: Perplexity's Comet browser shows critical security flaws allowing data theft through prompt injection attacks disclosed by Brave and LayerX from August through October 2025. https://ppc.land/comet-browser-faces-multiple-security-vulnerabilities-from-prompt-injection/ #CometBrowser #SecurityFlaws #DataTheft #CyberSecurity #PromptInjection
Comet browser faces multiple security vulnerabilities from prompt injection

Perplexity's Comet browser shows critical security flaws allowing data theft through prompt injection attacks disclosed by Brave and LayerX from August through October 2025.

PPC Land
Whistle-Blower Sues Meta Over Claims of WhatsApp Security Flaws

In a lawsuit filed Monday, the former head of security for the messaging app accused the social media company of putting billions of users at risk. Meta pushed back on his claim.

The New York Times
🚨 Oh no! The CVE program is floundering like a fish out of water because the #DHS forgot to hit the "renew" button. 🙈 Apparently, keeping track of security flaws is a bit too complicated for the grown-ups in charge. 🤷‍♂️
https://www.csoonline.com/article/3963190/cve-program-faces-swift-end-after-dhs-fails-to-renew-contract-leaving-security-flaw-tracking-in-limbo.html #CVEprogram #securityflaws #technews #cybersecurity #fail #HackerNews #ngated
CVE program averts swift end after CISA executes 11-month contract extension

After DHS did not renew its funding contract for reasons unspecified, MITRE’s 25-year-old Common Vulnerabilities and Exposures (CVE) program was slated for an abrupt shutdown on April 16, which would have left security flaw tracking in limbo. CISA stepped in to provide a bridge.

CSO Online
CVE program averts swift end after CISA executes 11-month contract extension

After DHS did not renew its funding contract for reasons unspecified, MITRE’s 25-year-old Common Vulnerabilities and Exposures (CVE) program was slated for an abrupt shutdown on April 16, which would have left security flaw tracking in limbo. CISA stepped in to provide a bridge.

CSO Online
Windows 10 security flaws leave millions vulnerable

Microsoft patches 12 critical flaws, but six have already been exploited by criminals. Kurt “CyberGuy" Knutsson says updating your system is only a short-term fix.

Fox News
👁️‍🗨️ The Silent Watchers in Your Pocket

They call it instant messaging—instant access, instant tracking, instant surveillance. Every chat, every voice note, every reaction is another breadcrumb on the path they map for you. We think we&#…

Tom's IT Cafe
### Applied Murphy's Laws for Cryptography (Loose Interpretation)
1. **Law of Encryption Complexity:**
The more complex the encryption algorithm, the faster someone will find a simple way to break it.
2. **Law of Limited Time:**
When there's no time to generate the perfect key, "1234" becomes the default password.
3. **Law of Trust:**
The greatest vulnerability in any cryptosystem is the person using it.
4. **Law of Privacy Illusion:**
The moment you feel completely anonymous, someone will access your metadata.
5. **Law of the Forgotten Key:**
If a private key is created and perfectly secured, you’ll lose access to it at the worst possible moment.
6. **Law of Overconfidence:**
"This algorithm is unbreakable" — until a student proves otherwise in their thesis.
7. **Developer’s Law:**
The best cryptographic solution you design will be broken by your own testing team.
8. **Law of Universality:**
The more universal the crypto algorithm, the more exposed it is to attacks on its weak points.
9. **Law of Resource Economy:**
Every cryptosystem is a compromise between security and performance, but breaking it will always be faster.
10. **Law of Government Interference:**
If your algorithm is good enough to thwart hackers, regulators will demand a backdoor.
11. **Law of the Attacker:**
Your cryptography is never too complex for a hacker, but always too complex for the average user.
12. **Law of Unforeseen Flaws:**
Every algorithm has a vulnerability, but you'll discover it only when it's too late.
13. **Law of Urgent Updates:**
The moment you deploy a new cryptosystem, its algorithm becomes outdated by current standards.
14. **Law of Retrospect:**
"No one will break RSA in our lifetime" — until quantum computers prove otherwise.
15. **Law of Entropy:**
The more complex the password, the more likely the user is to write it on a sticky note and attach it to their monitor.
16. **Law of Crypto-Anarchy:**
The more secure your system, the more it annoys governments and corporations.
17. **Law of Simplicity:**
If something in cryptography looks too simple to be broken, it's already been compromised.
18. **Key Length Law:**
The moment you double the key length, someone finds an attack that breaks both the old and new versions.
19. **Law of Paranoia:**
In cryptography, you’re either not paranoid enough or already too late.
20. **Law of the Last Test:**
The biggest vulnerability will be discovered one minute after the system goes live.
---
### **Hashtags (23):**
#MurphysLaw #Cryptography #CyberSecurity #Encryption #DataProtection #Privacy #DigitalSecurity #CryptoFails #QuantumComputing #Hacking #PasswordSecurity #CryptographicAlgorithms #CyberThreats #DataEncryption #KeyManagement #ParanoiaInSecurity #UnbreakableCode #SecurityFlaws #BackdoorThreat #ITHumor #TechAnarchy #StickyNotePasswords #QuantumThreats #cryptoinsights
CERT- All You Need to Know About Over 50 Security Flaws Affecting Android Smartphones
CERT-In has warned of serious security flaws affecting major versions of Google's Android operating system. 51 security vulnerabilities listed.
https://dothebuzz.com/informational/cert-all-you-need-to-know-about-over-50-security-flaws-affecting-android-smartphones/
#informational #Android #IndianCERT #SecurityFlaws #SecurityPatch #vulnerabilities
CERT- All You Need to Know About Over 50 Security Flaws Affecting Android Smartphones - Do The Buzz

CERT-In has warned of serious security flaws affecting major versions of Google's Android operating system. 51 security vulnerabilities listed.

Do The Buzz - Enjoy the best buzzying articles for free!