Advertisement

Agentic AI

Jay Harless, director of human development and Sasha Muth, deputy director of human development at the National Geospatial-Intelligence Agency speak at the Workday Federal Forum presented by Scoop News Group. (Image Source: Scoop News Group)

Spy agency officials say job loss anxiety, moving fast ‘safely’ among top challenges in AI workforce overhaul

While tech leaders think about how to strategically deploy AI tools to support human intelligence needs, rank and filers express concerns about their livelihoods.
CANADA – 2026/04/08: In this photo illustration, the Google Antigravity logo is seen displayed on a smartphone screen. (Photo Illustration by Thomas Fuller/SOPA Images/LightRocket via Getty Images)

Vuln in Google’s Antigravity AI agent manager could escape sandbox, give attackers remote code execution

Google’s highest security setting for its agents runs command operations through a sandbox and throttles network access, but is still vulnerable to prompt injection.
Advertisement
HONG KONG, CHINA – 2025/03/01: In this photo illustration, A new web browser ‘Comet’ by perplexity is seen on a computer. Perplexity have announced on Monday, Feb 24th, 2025, their plans to release ‘Comet’, a new web browser that aims to revolutionise browsing. (Photo Illustration by May James/SOPA Images/LightRocket via Getty Images)

Federal judge blocks Perplexity’s AI browser from making Amazon purchases

Amazon sued the AI browser company last year, accusing them of computer fraud, accessing password protected accounts and buying items.
Researchers at Zenity Labs discovered flaws affecting multiple AI browsers, including Perplexity’s Comet. Before being patched, an attacker could exploit them via a legitimate calendar invite, using a prompt injection to force the AI browser to act against its user. (Image via Getty)

Researchers discover suite of agentic AI browser vulnerabilities

Through a simple calendar invite, AI browsers like Comet can be directed to access local file systems, browse directories, open and read files, and exfiltrate data.
Advertisement
Advertisement