Home
Categories
EXPLORE
True Crime
Comedy
Business
Sports
Society & Culture
History
Fiction
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/cc/15/8b/cc158b7e-f10b-f318-eb76-1d4812793a22/mza_2095699107852639163.jpg/600x600bb.jpg
Decoding CyberSecurity
Rakesh Nayam
35 episodes
1 week ago
Welcome to Decoding CyberSecurity – the podcast that simplifies the complex world of cybersecurity. Hosted by an experienced Information Security Engineer with certifications like CISSP and CISM, each episode dives into essential topics, career advice, and real-world insights to help you break into and excel in cybersecurity. Whether you're just starting out, studying for certifications like Security+, or aiming for advanced credentials, we’re here to guide you. Join us every week as we uncover the skills, news, and tips you need to stay ahead in the field!
Show more...
Technology
RSS
All content for Decoding CyberSecurity is the property of Rakesh Nayam and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to Decoding CyberSecurity – the podcast that simplifies the complex world of cybersecurity. Hosted by an experienced Information Security Engineer with certifications like CISSP and CISM, each episode dives into essential topics, career advice, and real-world insights to help you break into and excel in cybersecurity. Whether you're just starting out, studying for certifications like Security+, or aiming for advanced credentials, we’re here to guide you. Join us every week as we uncover the skills, news, and tips you need to stay ahead in the field!
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/42353630/42353630-1765546411130-bb6fd0d8dc895.jpg
I Tricked an AI Browser with a Recipe (Prompt Injection)
Decoding CyberSecurity
10 minutes 47 seconds
4 weeks ago
I Tricked an AI Browser with a Recipe (Prompt Injection)

Will AI browsers like OpenAI's Atlas and Perplexity's Comet replace Chrome, or are they just a new security nightmare waiting to happen?In this episode of Decoding CyberSecurity, we dive deep into the "AI Browser Wars of 2025." I run a live Red Team exercise to see if I can trick these new "Agentic" browsers using nothing but a curry recipe and some invisible text. The results? Terrifying.We test:OpenAI Atlas: The ChatGPT-native browser.Perplexity Comet: The research powerhouse.Microsoft Edge Copilot: The integrated assistant.Google Chrome Gemini: The incumbent defender.If you use AI tools to browse the web, you need to see this.Timestamps: 0:00 - The "Recipe" Hack: How I Tricked an AI Agent 1:23 - Chapter 1 - The Battlefield: Atlas vs Comet vs Copilot vs Chrome 1:24 - Atlas (OpenAI): Features & Safety Check 1:55 - Comet (Perplexity): The Free Desktop Contender 2:19 - Edge Copilot: Actions & "Journeys" Explained 2:48 - Chrome Gemini: The "Assist-First" Approach 3:20 - TRIVIA: Can you answer this Web Security Question? 3:45 - Chapter 2 - The Live Test: Red Teaming the "Aarav" Scenario 5:30 - Chapter 3 - The Exploit: How Indirect Prompt Injection Works 7:00 - Chapter 4 - The Verdict: Which Browser is actually safe? 8:12 - Chapter 5 - Cyber-Pro Checklist: 5 Rules to Stay Safe 12:15 - Trivia Answer & EpilogueKey Takeaways:Indirect Prompt Injection: How hackers hide instructions in images/text that humans can't see but AI agents obey.Agentic Browsing: The shift from "searching" to "doing," and why it expands the attack surface.Defense Strategy: Why you should run AI agents in a separate, logged-out browser profile.Mentioned Tools & Concepts:OpenAI Atlas BrowserPerplexity CometPrompt Injection / JailbreakingOWASP LLM Top 10#AIBrowser #OpenAIAtlas #PromptInjection #CyberSecurity #RedTeaming #TechTrends2025 #Perplexity #Gemini #EdgeCopilot #EthicalHackingExplaining cybersecurity frameworks, AI in SOCs, threat modeling, phishing detection, insider risk, network security protocols, Cyber Security, Artificial Intelligence, AI, Information Security, Hacking, Hacker, Hacks, Cyber Stories, Threat intelligence analysts, Cloud security architects, Incident response teams, Zero Trust, cybersecurity 2026, ethical hacking, SOC analyst, NIST framework, zero trust, cybersecurity explained, OWASP Top 10, SIEM tools, penetration testing, threat intel, SIEM, Explaining cybersecurity frameworks, AI in SOCs, threat modeling, phishing detection, insider risk, network security protocols, Threat intelligence analysts, Cloud security architects, Incident response teams, Zero Trust, cybersecurity 2024, ethical hacking, SOC analyst, NIST framework, zero trust, cybersecurity explained, OWASP Top 10, SIEM tools, penetration testing, threat intel, SIEM, Explaining cybersecurity frameworks, AI in SOCs, threat modeling, phishing detection, insider risk, network security protocols, Ransomware, Deepfake, IoT, Cyber Resilience, Threat Intelligence, Threat Hunting, Threat Detection, Security Education, Insider Threat, Malware Defense, Threat Actors, Certification Courses, CompTIA, CISSP, CISM, CEH, Zero-Day, Quantum Computing, Virus, Anti-Virus*This video is for educational purposes only*

Decoding CyberSecurity
Welcome to Decoding CyberSecurity – the podcast that simplifies the complex world of cybersecurity. Hosted by an experienced Information Security Engineer with certifications like CISSP and CISM, each episode dives into essential topics, career advice, and real-world insights to help you break into and excel in cybersecurity. Whether you're just starting out, studying for certifications like Security+, or aiming for advanced credentials, we’re here to guide you. Join us every week as we uncover the skills, news, and tips you need to stay ahead in the field!