Click any tag below to further narrow down your results
Links
SquareX's research reveals a concealed MCP API in the Comet browser that allows extensions to execute commands and access user devices without permission. This breach of security principles raises concerns about potential exploitation and the lack of transparency surrounding embedded extensions.
This article outlines how developers in Japan can use alternative browser engines in iOS apps. It details the requirements for both dedicated browser apps and in-app browsing, including security and privacy commitments developers must meet to gain authorization.
Norton Neo is an AI-native browser that prioritizes user privacy by storing data locally and allowing users to control what information is remembered. It aims to streamline browsing with features that reduce clutter and enhance productivity. Users can expect a smooth experience with built-in protection against malicious sites.
DumpBrowserSecrets is a tool that extracts sensitive data from various web browsers, including Chrome, Firefox, and Edge. It retrieves information like cookies, credentials, and browsing history using a combination of executable and DLL components. The tool can handle both Chromium-based and non-Chromium browsers for data extraction and decryption.
ZeroCrumb is a tool that bypasses Chrome's Elevation Service to extract app-bound credentials and cookies. It uses Transacted Hollowing to impersonate a Chrome instance and decrypt keys, allowing access to sensitive data. Users can implement it as a library and customize it for other credential types.
The article explores using web browsers as a secure environment for running untrusted code, focusing on the potential of browser-based tools like Co-do. It discusses the importance of file and network isolation in maintaining user control and safety when executing code from sources like LLMs. The author highlights existing browser capabilities and suggests methods for improving sandboxing techniques.
As AI browser agents like Claude for Chrome emerge, security experts warn about the risks of websites hijacking these agents through hidden malicious instructions. Despite extensive testing, nearly 25% of attempts to trick AI into harmful actions were successful, raising concerns about user safety as AI integration in browsers accelerates.
The Comet AI browser from Perplexity has raised significant security concerns after it was revealed that it could be manipulated by malicious websites. Unlike traditional browsers, AI browsers like Comet can execute commands and remember user interactions, making them vulnerable to exploitation if not designed with robust security measures. The article outlines the fundamental flaws in AI browser design and suggests necessary improvements to enhance user safety.
Users attempting to access the author's blog are being blocked due to outdated browser versions that are often used by high-volume crawlers, particularly for data collection for LLM training. The author encourages users to contact him if they believe this block is in error and suggests using archive.org for better archiving practices compared to other services that mimic malicious behavior.
The author explains that users with outdated browser versions may encounter access issues due to anti-crawler measures implemented to mitigate high-volume scraping activities. This includes a warning about certain archiving services that mimic malicious crawlers, suggesting users switch to archive.org for a better experience.
Users attempting to access the author's blog are encountering restrictions due to their use of outdated browsers, which are flagged as potentially harmful by anti-crawler measures. The author explains the issue stems from a rise in high-volume crawlers mimicking old browser user agents and suggests using a different archiving service for better compatibility.
Users attempting to access the author's blog may encounter issues if they are using outdated browser versions, particularly older Chrome versions, which are flagged as suspicious by anti-crawler measures. The author explains that this is a response to high volumes of crawlers that mimic old user agents, and suggests using archive.org for better archival service.
Red Access offers a lightweight security solution for the modern workforce, enabling organizations to secure web sessions and data without disrupting existing workflows or requiring major architectural changes. The platform integrates seamlessly with current IT stacks, providing comprehensive security features such as data loss prevention, zero trust browsing, and network security without the need for additional software or changes to user habits.
The article discusses the resurgence of browser cache smuggling techniques, specifically focusing on the use of "droppers" as a method to exploit cache mechanisms. It explores the implications for web security and the potential risks associated with these vulnerabilities in modern browsers.