By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads& Malicious Link Distribution | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads& Malicious Link Distribution | HackerNoon
Computing

SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads& Malicious Link Distribution | HackerNoon

News Room
Last updated: 2025/10/09 at 8:32 PM
News Room Published 9 October 2025
Share
SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads& Malicious Link Distribution | HackerNoon
SHARE

Palo Alto, California, October 9th, 2025/CyberNewsWire/–As AI Browsers rapidly gain adoption across enterprises, SquareX has released critical security research exposing major vulnerabilities that could allow attackers to exploit AI Browsers to exfiltrate sensitive data, distribute malware and gain unauthorized access to enterprise SaaS apps.

The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or released their own AI browsers.

With Chrome and Edge alone representing 70% of the browser market share, it is very likely that the majority of consumer browsers in the future will be AI Browsers. Thus, it is critical for organizations to prepare for these security risks associated with this fundamental change.

“Just like any AI Agent, AI Browsers are trained to complete tasks, not to be security aware. This makes it trivial for attackers to trick browsers like Comet into performing malicious tasks, by convincing them that it is a necessary part of the workflow they are completing,” warns Vivek Ramachandran, Founder of SquareX,

“With two major consumer browsers publicly announcing their entry to the AI Browser race, it is inevitable that AI Browsers will be the primary way we interact with the internet in the future. Without the right browser-native solution that can implement guardrails on these AI Browsers that take into account agentic identity and agentic DLP, millions of users will be at risk.”

In the technical blog, SquareX discloses a few ways Comet was exploited, illustrating each with case studies. In one example, in completing a research task, Comet fell prey to an OAuth attack, providing attackers with full access to the victim’s email and Google Drive.

This allowed attackers to exfiltrate every file stored on the victim’s account, including those shared by colleagues and customers. In another, the AI browser was completing tasks in the user’s inbox – a common use case advertised by Comet itself – when it ended up distributing a malicious link to the victim’s colleague through a calendar invite. Other examples include tricking Comet into downloading known malwares and emailing sensitive files to attackers. 

Unfortunately, existing solutions like EDRs and SASE/SSE have limited visibility into browsers. Today, there is no way to differentiate between activities performed by a user or Comet, as both network requests originate from the same browser.

Thus, it is critical that enterprises have a browser-native solution that can differentiate between agentic and user identities, allowing them to apply differentiated guardrails on the data and actions that the AI browser can access or perform.

In a commentary on SquareX’s research, Stephen Bennett, Group CISO at Domino’s Pizza Enterprises Ltd., says “Browsers have always been our universal gateway to the internet. AI browsers are the next logical step where instead of simply displaying information, the browser acts autonomously on our behalf. The trade off? Where we were once firmly in the driving seat, AI browsers will push us to be passengers.”

With the increasing integration of agentic AI into browsers, AI agents may soon dominate browsing activity over human users. This shift necessitates a collaboration between enterprises, browser developers, and cybersecurity companies to create robust security frameworks and protective measures to prevent attackers from exploiting AI Browsers.

SquareX’s findings provide a crucial warning about the dangers of relying on traditional solutions to solve modern threats, and hopes to serve as an encouragement for an urgent industry-wide cooperation.

About SquareX

SquareX‘s browser extension turns any browser on any device into an enterprise-grade secure browser, including AI Browsers. SquareX’s industry-first Browser Detection and Response (BDR) solution empowers organizations to proactively defend against browser-native threats including rogue AI agents, Last Mile Reassembly Attacks, malicious extensions and identity attacks.

Unlike dedicated enterprise browsers, SquareX seamlessly integrates with users’ existing consumer browsers, delivering security without compromising user experience. More information about SquareX’s research-led innovation is available at www.sqrx.com.

Contact

Head of PR

Junice Liew

SquareX

[email protected]

:::tip
This story was published as a press release by Cybernewswire under HackerNoon’s Business Blogging Program. Do Your Own Research before

:::

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Gemini Starts Rolling Out To Google Home Users In Early Access – Here’s How To Sign Up – BGR Gemini Starts Rolling Out To Google Home Users In Early Access – Here’s How To Sign Up – BGR
Next Article IFA 2008 Preview IFA 2008 Preview
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Bed bug infestations rise 62% in December — these 4 Christmas oils can ward off the pests from your mattress
Bed bug infestations rise 62% in December — these 4 Christmas oils can ward off the pests from your mattress
News
Want a Steam Deck 2? This leaked Lenovo Legion Go 2 variant could be for you
Want a Steam Deck 2? This leaked Lenovo Legion Go 2 variant could be for you
News
Chinese aviation company EHang picks Gotion High-Tech as preferred battery supplier for air taxis · TechNode
Chinese aviation company EHang picks Gotion High-Tech as preferred battery supplier for air taxis · TechNode
Computing
These Were Wordle's Toughest 10 Words of 2025. How Many Did You Get?
These Were Wordle's Toughest 10 Words of 2025. How Many Did You Get?
News

You Might also Like

Chinese aviation company EHang picks Gotion High-Tech as preferred battery supplier for air taxis · TechNode
Computing

Chinese aviation company EHang picks Gotion High-Tech as preferred battery supplier for air taxis · TechNode

1 Min Read
15 Types of Social Media Influencers You Need to Know in 2025
Computing

15 Types of Social Media Influencers You Need to Know in 2025

7 Min Read
MaGGIe Architecture Deep Dive: Mask Guidance and Sparse Refinement | HackerNoon
Computing

MaGGIe Architecture Deep Dive: Mask Guidance and Sparse Refinement | HackerNoon

3 Min Read
Li Auto has more supercharging locations than Tesla in China, CEO says · TechNode
Computing

Li Auto has more supercharging locations than Tesla in China, CEO says · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?