Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Technology
Sports
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/9c/8e/d9/9c8ed9d4-8064-113d-8ea4-bf9eea7fa69a/mza_13837699358622918663.jpg/600x600bb.jpg
The Cyber Cyber
Seven Hill Ventures
4 episodes
4 hours ago
The Cyber Cyber Podcast is the essential briefing for security professionals, cyber defenders, and organizational leaders seeking to stay one step ahead of the rapidly evolving threat landscape. Drawing on industry-leading research, this podcast provides an in-depth analysis of the world’s most advanced threat actors—from sophisticated nation-states to specialized eCrime groups. Each episode tackles the crucial challenge of defending organizations against adversaries who are becoming more efficient, focused, and business-like in their approach
Show more...
Tech News
News
RSS
All content for The Cyber Cyber is the property of Seven Hill Ventures and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Cyber Cyber Podcast is the essential briefing for security professionals, cyber defenders, and organizational leaders seeking to stay one step ahead of the rapidly evolving threat landscape. Drawing on industry-leading research, this podcast provides an in-depth analysis of the world’s most advanced threat actors—from sophisticated nation-states to specialized eCrime groups. Each episode tackles the crucial challenge of defending organizations against adversaries who are becoming more efficient, focused, and business-like in their approach
Show more...
Tech News
News
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/44747726/44747726-1762378046407-a9f337033e4e3.jpg
The Agentic AI Threat: Why Your Browser Is the New Weakest Link
The Cyber Cyber
19 minutes 19 seconds
1 month ago
The Agentic AI Threat: Why Your Browser Is the New Weakest Link

The browser wars have entered their most exciting and perhaps most dangerous chapter since 2008, driven by the emergence of AI Browsers like Perplexity’s Comet, OpenAI’s ChatGPT Atlas, and Microsoft’s Copilot Mode. This episode deep-dives into the alarming cybersecurity vulnerabilities arising from these new platforms, especially those featuring powerful AI Agents.

Unlike traditional browsers, AI browsers are much more powerful because they learn from everything, creating a "more invasive profile than ever before," coupled with stored credentials that hackers seek to access.

These AI Agents operate at the user’s same privilege level and can perform automated, agentic workflows like navigating pages, logging into accounts, purchasing tickets, or sending emails. This capability creates a "minefield of new vulnerabilities" and makes the browser the initial access point for sophisticated cyber-attacks.

We explore the fundamental security flaw: Prompt Injection

  • The Prompt Injection Epidemic
  • Hidden Attack Vectors

Case Studies in Catastrophe and Agent Hijacking:

  • CometJacking (URL Injection)
  • Tainted Memories (Persistent CSRF)
  • Physical Havoc
  • OAuth and Ransomware Delivery

Securing the Next Frontier:

  • Establish Agentic Identity
  • Isolate Agentic Browsing
  • Enforce Explicit User Confirmation
  • Treat Content as Untrusted
  • Implement Browser-Native Controls
  • Require Client-side File Scanning


The Cyber Cyber
The Cyber Cyber Podcast is the essential briefing for security professionals, cyber defenders, and organizational leaders seeking to stay one step ahead of the rapidly evolving threat landscape. Drawing on industry-leading research, this podcast provides an in-depth analysis of the world’s most advanced threat actors—from sophisticated nation-states to specialized eCrime groups. Each episode tackles the crucial challenge of defending organizations against adversaries who are becoming more efficient, focused, and business-like in their approach