Zenity Labs logo
Zenity Labs
AI Agent Security Summit (On Demand)Join Us
Subscribe
  • Zenity Labs
  • Archive
  • Page -2634
Catching Prompt Guard Off Guard: Exploiting Overfit in Training Algorithms
Mar 12, 2026

Catching Prompt Guard Off Guard: Exploiting Overfit in Training Algorithms

How understanding the training algorithms used in machine learning models may allow attacker to bypass them entirely

Tomer Wetzler
Tomer Wetzler
Security researchSecurity research
PerplexedBrowser: How Attackers Can Hijack Comet to Takeover your 1Password Vault
Mar 03, 2026

PerplexedBrowser: How Attackers Can Hijack Comet to Takeover your 1Password Vault

One Calendar Invite. Your Entire Vault. Zero Clicks.

Stav Cohen
Stav Cohen
Security researchSecurity research
PerplexedBrowser: Perplexity’s Agent Browser Can Leak Your PC's Local Files
Mar 03, 2026

PerplexedBrowser: Perplexity’s Agent Browser Can Leak Your PC's Local Files

Local Files Are No Longer Safe.

Stav Cohen
Stav Cohen
Security researchSecurity research
Turning Moltbook Into a Global Botnet Map
Feb 18, 2026

Turning Moltbook Into a Global Botnet Map

How Untrusted Content Triggered 1,000+ Agent Endpoints Worldwide and Exposed Moltbook’s Faulty Design

Stav Cohen
João Donato
Stav Cohen, +1
Looking Inside: a Maliciousness Classifier Based on the LLM's Internals
Feb 18, 2026

Looking Inside: a Maliciousness Classifier Based on the LLM's Internals

Beyond input & output filtering and how well does it generalize to your out-of-distribution production data?

Max Fomin
Max Fomin
Security researchSecurity research
Perplexity Comet: A Reversing Story
Feb 11, 2026

Perplexity Comet: A Reversing Story

A deeper look into an agentic browser's inner workings

Raul Klugman-Onitza
Raul Klugman-Onitza
Security researchSecurity research
OpenClaw or OpenDoor?
Feb 04, 2026

OpenClaw or OpenDoor?

Indirect Prompt Injection makes OpenClaw vulnerable to Backdoors and much more.

Stav Cohen
João Donato
Stav Cohen, +1
Security researchSecurity research
Agent-to-Agent Exploitation in the Wild: Observed Attacks on Moltbook
Feb 03, 2026

Agent-to-Agent Exploitation in the Wild: Observed Attacks on Moltbook

Agent-targeted social engineering and attacks observed on a live agent network

Avishai Efrat
Avishai Efrat
Clawdbot: More than you bargained for?
Jan 27, 2026

Clawdbot: More than you bargained for?

Inbar Raz
Inbar Raz
Security researchSecurity research
Agentic Recon: Discovering and Mapping Public AI Agents
Jan 19, 2026

Agentic Recon: Discovering and Mapping Public AI Agents

A Copilot Studio case study in agent discovery and capability mapping

Avishai Efrat
Avishai Efrat
Security researchSecurity research
Threat Actors Are Already Scanning For Your AI Deployments and Middleware
Jan 13, 2026

Threat Actors Are Already Scanning For Your AI Deployments and Middleware

What recent scanning activity means for your AI middleware and agentic deployments

Tamir Ishay Sharbat
Avishai Efrat
Tamir Ishay Sharbat, +1
Moving The Decision Boundary of LLM Safety Classifiers
Jan 04, 2026

Moving The Decision Boundary of LLM Safety Classifiers

How a new fine-tuning approach can mitigate the problem of inaccurate safety paths

Tomer Wetzler
Tomer Wetzler
FirstBack
1234567
Next Last
Latest research, tools and talks about breaking and building AI systems, agents and assistants

Zenity Labs

Latest research, tools and talks about breaking and building AI systems, agents and assistants

Home

Posts

Authors

© 2026 Zenity Labs.

Privacy policy

Terms of use

Powered by beehiiv