Perplexity Comet Browser Vulnerable To Prompt Injection Exploit via @sejournal, @martinibuster

Brave published details about a security issue with Comet, Perplexity’s AI browser, that enables an attacker to inject a prompt into the browser and gain access to data in other open browser tabs.

Comet AI Browser Vulnerability

Brave described a vulnerability that can be activated when a user asks the Comet AI browser to summarize a web page. The LLM will read the web page, including any embedded prompts that command the LLM to take action on any open tabs

According to Brave:

“The vulnerability we’re discussing in this post lies in how Comet processes webpage content: when users ask it to “Summarize this webpage,” Comet feeds a part of the webpage directly to its LLM without distinguishing between the user’s instructions and untrusted content from the webpage. This allows attackers to embed indirect prompt injection payloads that the AI will execute as commands. For instance, an attacker could gain access to a user’s emails from a prepared piece of text in a page in another tab.”

A post on Simon Willison’s Weblog shared that Perplexity tried to patch the vulnerability but the fix does not work.

A developer posted the following on X:

“Why is no one talking about this?

This is why I don’t use an AI browser

You can literally get prompt injected and your bank account drained by doomscrolling on reddit:”

Things aren’t looking good for Comet Browser at this time.

Non-Profit Organization Announces Free Domain Names via @sejournal, @martinibuster

A non-profit organization that is supported by Cloudflare, GitHub, and other organizations has open-sourced domain names, making them available with no catches or hidden fees. The sponsor of the free domain names explains that their purpose is not to replace commercial domain names but to offer an open-source alternative for developers, students, and people who want to create a hobby site for free.

The goal is to encourage making the Internet a free and open space so that everyone can publish and express themselves online without financial barriers.

DigitalPlat

The open source domains are offered by DigitalPlat, a non-profit organization that’s sponsored by 1Password, The Hack Club (The Hack Foundation), twilio, GitHub and Cloudflare.

The Hack Foundation is a certified non-profit organization of high school students that receive support from hundreds of supporters including Google.org and Elon Musk. The organization was founded in 2016.

According to their website:

“In 2018, The Hack Foundation expanded to act as a nonprofit fiscal sponsor for Hack Clubs, hackathons, community organizations, and other for-good projects.

Today, hundreds of diverse groups ranging from a small town newspaper in Vermont to the largest high-school hackathon in Pennsylvania are fiscally sponsored by The Hack Foundation.”

A notice posted on The Hack Foundation donation web page explains their connection to DigitalPlat:

“The DigitalPlat Foundation is a global non-profit organization that supports open-source and community development while exploring innovative projects. All funds are supervised and managed by The Hack Foundation, and are strictly regulated in compliance with US IRS guidance and legal requirements under section 501(c)(3). “

DigitalPlat FreeDomain

The free domain names can be registered via DigitalPlat and the free domains project is open source, licensed under AGPL-3.0.

An announcement was made by the GitHubs Projects Community on X with a link to a GitHub page for the free domains where the following domain extensions are listed as choices:

  • .DPDNS.ORG
  • .US.KG
  • .QZZ.IO
  • .XX.KG

Technically, those are subdomains. But so are .uk.com domains.

The official GitHub page for the domains recommends using Cloudflare, FreeDNS by Afraid.org, or Hostry for managing the DNS for zero cost.

The .KG domain is from the country code of Kyrgyzstan. DPDNS.ORG is the domain name of DigitalPlat FreeDomain. .US.KG is operated by the DigitalPlat Foundation, a non-profit charitable organization that’s sponsored by The Hack Foundation.

The Open-Source Projects page for the free domains explains the purpose and goals of the free domain offers:

“The project is open source (licensed under AGPL-3.0), transparent, and backed by The Hack Foundation, a U.S. 501(c)(3) nonprofit. This isn’t a trial or a limited-time offer—it’s a sustainable effort to increase accessibility on the web.”

Full directions for registering a free domain name can be found here.

Featured Image by Shutterstock/TenPixels

Google: Why Lazy Loading Can Delay Largest Contentful Paint (LCP) via @sejournal, @MattGSouthern

In a recent episode of Google’s Search Off the Record podcast, Martin Splitt and John Mueller discussed when lazy loading helps and when it can slow pages.

Splitt used a real-world example on developers.google.com to illustrate a common pattern: making every image lazy by default can delay Largest Contentful Paint (LCP) if it includes above-the-fold visuals.

Splitt said:

“The content management system that we are using for developers.google.com … defaults all images to lazy loading, which is not great.”

Splitt used the example to explain why lazy-loading hero images is risky: you tell the browser to wait on the most visible element, which can push back LCP and cause layout shifts if dimensions aren’t set.

Splitt said:

“If you are using lazy loading on an image that is immediately visible, that is most likely going to have an impact on your largest contentful paint. It’s like almost guaranteed.”

How Lazy Loading Delays LCP

LCP measures the moment the largest text or image in the initial viewport is painted.

Normally, the browser’s preload scanner finds that hero image early and fetches it with high priority so it can paint fast.

When you add loading="lazy" to that same hero, you change the browser’s scheduling:

  • The image is treated as lower priority, so other resources start first.
  • The browser waits until layout and other work progress before it requests the hero image.
  • The hero then competes for bandwidth after scripts, styles, and other assets have already queued.

That delay shifts the paint time of the largest element later, which increases your LCP.

On slow networks or CPU-limited devices, the effect is more noticeable. If width and height are missing, the late image can also nudge layout and feel “jarring.”

SEO Risk With Some Libraries

Browsers now support a built-in loading attribute for images and iframes, which removes the need for heavy JavaScript in standard scenarios. WordPress adopted native lazy loading by default, helping it spread.

Splitt said:

“Browsers got a native attribute for images and iframes, the loading attribute … which makes the browser take care of the lazy loading for you.”

Older or custom lazy-loading libraries can hide image URLs in nonstandard attributes. If the real URL never lands in src or srcset in the HTML Google renders, images may not get picked up for indexing.

Splitt said:

“We’ve seen multiple lazy loading libraries … that use some sort of data-source attribute rather than the source attribute… If it’s not in the source attribute, we won’t pick it up if it’s in some custom attribute.”

How To Check Your Pages

Use Search Console’s URL Inspection to review the rendered HTML and confirm that above-the-fold images and lazy-loaded modules resolve to standard attributes. Avoid relying on the screenshot.

Splitt advised:

“If the rendered HTML looks like it contains all the image URLs in the source attribute of an image tag … then you will be fine.”

Ranking Impact

Splitt framed ranking effects as modest. Core Web Vitals contribute to ranking, but he called it “a tiny minute factor in most cases.”

What You Should Do Next

  • Keep hero and other above-the-fold images eager with width and height set.
  • Use native loading="lazy" for below-the-fold images and iframes.
  • If you rely on a library for previews, videos, or dynamic sections, make sure the final markup exposes real URLs in standard attributes, and confirm in rendered HTML.

Looking Ahead

Lazy loading is useful when applied selectively. Treat it as an opt-in for noncritical content.

Verify your implementation with rendered HTML, and watch how your LCP trends over time.


Featured Image: Screenshot from YouTube.com/GoogleSearchCentral, August 2025. 

Google Confirms New Google Verified Badge for Local Services Ads via @sejournal, @brookeosmundson

Google just announced a new unifying identity for its Local Services Ads (LSAs) verification badges.

Called Google Verified, the badge will replace several different trust signals that advertisers and consumers have been seeing over the years.

This includes the Google Guaranteed, Google Screened, License Verified by Google, and the Money Back Guarantee program.

Starting in October 2025, eligible LSAs that pass the necessary screenings will display this streamlined mark: a single badge designed to communicate credibility in a more consistent way.

Why is Google Consolidating Badges?

In the past, Google’s verification system was fragmented.

Different types of businesses had different badges, and consumers were left guessing what each one actually meant. Was a “Screened” provider more trustworthy than a “Guaranteed” one? Did a license verification carry more weight than a money-back promise?

The lack of consistency made it harder for advertisers to explain their value and for consumers to make decisions.

By rolling everything into one identity, Google Verified aims to simplify the process for everyone involved.

The badge will not only appear across Local Service Ads but will also include transparency for consumers. When a user taps or hovers over the badge, they can see the specific checks a business has passed.

How Does This Change Impact Advertisers?

For marketers and business owners, the simplified badge system removes some of the confusion around what signals matter.

Instead of juggling multiple programs, the message is now clear: your business is either Google Verified, or it’s not.

That said, the bar for participation may feel higher. Businesses that don’t keep their documentation, licensing, and other requirements up to date risk losing the badge.

Since Google has indicated it may only show the badge when it predicts it will help users make decisions, credibility and visibility could become even more closely linked.

In short, advertisers who maintain verification stand to benefit from increased trust, while those who lag behind could see their ads appear less competitive.

This update doesn’t require marketers to overhaul their entire strategy by any means. However, there are a few practical steps you can take to ensure a smooth transition by October.

  • Review eligibility now. Make sure your licenses, insurance, and background checks are up-to-date before October.
  • Build in reminders. Treat verification like an ongoing compliance process, not a one-time task.
  • Educate clients or internal teams. If you manage LSA campaigns for others, help them understand that the badge isn’t just a cosmetic update. It reflects ongoing credibility.
  • Monitor performance post-launch. Once the new badge rolls out, watch for shifts in click-thru rate (CTR) and conversion rates. If verification gives a measurable lift, you’ll want to highlight that value in your reporting.

A Shift Toward Ongoing Trust

Google Verified may look like a rebrand on the surface, but it’s also a signal that trust in digital advertising is moving toward continuous validation.

For businesses, this means credibility is not something you earn once; it’s something you prove over and over again.

For advertisers, the key takeaway is simple: don’t treat this as a one-time update. Verification will become an expectation, not a nice-to-have, and it could influence not just how consumers view your ads but how often those ads are shown.

Google AI Mode Adds Agentic Booking, Expands To More Countries via @sejournal, @MattGSouthern

Google is adding agentic booking features to AI Mode in Search, beginning with restaurant reservations for U.S. Google AI Ultra subscribers enrolled in Labs.

What’s New

Booking Reservations

AI Mode can interpret a detailed request, check real-time availability across reservation sites, and link you to the booking page to complete the task.

For businesses, that shifts more discovery and conversion activity inside Google’s surfaces.

Robby Stein wrote on The Keyword:

“We’re starting to roll out today with finding restaurant reservations, and expanding soon to local service appointments and event tickets.”

Screenshot from: blog.google/products/search/ai-mode-agentic-personalized/, August 2025.

Planning Features

Google is introducing planning features that make results easier to share and tailor queries.

In the U.S., you can share an AI Mode response with others so they can ask follow-ups and continue research on their own, and you can revoke the link at any time.

Screenshot from: blog.google/products/search/ai-mode-agentic-personalized/, August 2025.

Separately, U.S. users who opt in to the Labs experiment can receive personalized dining suggestions informed by prior conversations and interactions in Search and Maps, with controls in Google Account settings.

How It Works

Under the hood, Google cites live web browsing via Project Mariner, partner integrations, and signals from the Knowledge Graph and Maps.

Named partners include OpenTable, Resy, Tock, Ticketmaster, StubHub, SeatGeek, and Booksy. Dining is first; local services and ticketing are next on the roadmap.

Availability

Availability is gated. Agentic reservations are limited to Google AI Ultra subscribers in the U.S. through the “Agentic capabilities in AI Mode” Labs experiment.

Personalization is U.S. and opt-in, with dining topics first. Link sharing is available in the U.S. Global access to AI Mode is expanding to more than 180 countries and territories in English, with additional languages planned.

Looking Ahead

AI Mode is moving from answer generation to task completion.

If your category relies on reservation or ticketing partners, verify inventory accuracy, hours, and policies now, and make sure your structured data and Business Profile attributes are clean.

Track how bookings and referrals appear in analytics as Google widens coverage to more tasks and regions.

Common Hosting Defenses Ineffective Against WordPress Threats via @sejournal, @martinibuster

Patchstack published a case study that examined how well Cloudflare and other general firewall and malware solutions protected WordPress websites from common vulnerability threats and attack vectors. The research showed that while general solutions stopped threats like SQL injection or cross-site scripting, a dedicated WordPress security solution consistently stopped WordPress-specific exploits at a significantly higher rate.

WordPress Vulnerabilities

Due to the popularity of the WordPress platform, WordPress plugins and themes are a common focus for hackers, and vulnerabilities can quickly be exploited in the wild. Once proof-of-concept code is public, attackers often act within hours, leaving website owners little time to react.

This is why it is critical to be aware of the security provided by a web host and of how effective those solutions are in a WordPress environment.

Methodology

Patchstack explained their methodology:

“As a baseline, we have decided to host “honeypot” sites (sites against which we will perform controlled pentesting with a set of 11 WordPress-specific vulnerabilities) with 5 distinct hosting providers, some of which have ingrained features presuming to help with blocking WordPress vulnerabilities and/or overall security.

In addition to the hosting provider’s security measures and third-party providers for additional measures like robust WAFs or other patching providers, we have also installed Patchstack on every site, with our test question being:

  • How many of these threats will bypass firewalls and other patching providers to ultimately reach Patchstack?
  • And will Patchstack be able to block them all successfully?”

Testing process

Each website was set up the same way, with identical plugins, versions, and settings. Patchstack used a “exploitation testing toolkit” to run the same exploit tests in the same order on every site. Results were checked automatically and by hand to see if attacks were stopped, and whether the block came from the host’s defenses or from Patchstack.

General Overview: Hosting Providers Versus Vulnerabilities

The Patchstack case study tested five different configurations of security defenses, plus Patchstack.

1. Hosting Provider A Plus Cloudflare WAF

2. Hosting Provider B + Firewall + Monarx Server and Website Security

3. Hosting Provider C + Firewall + Imunify Web Server Security

4. Hosting Provider D + ConfigServer Firewall

5. Hosting Provider E + Firewall

The result of the testing showed that the various hosting infrastructure defenses failed to protect the majority of WordPress-specific threats, catching only 12.2% of the exploits. Patchstack caught 100% of all exploits.

Patchstack shared:

“2 out of the 5 hosts and their solutions failed to block any vulnerabilities at the network and server levels.

1 host blocked 1 vulnerability out of 11.

1 host blocked 2 vulnerabilities out of 11.

1 host blocked 4 vulnerabilities out of 11.”

Cloudflare And Other Solutions Failed

Solutions like Cloudflare WAF or bundled services such as Monarx or Imunify failed to consistently address WordPress specific vulnerabilities.

Cloudflare’s WAF stopped 4 of 11 exploits, Monarx blocked none, and Imunify did not prevent any WordPress-specific exploits. Firewalls such as ConfigServer, which are widely used in shared hosting environments, also failed every test.

These results show that while those kinds of products work reasonably well against broad attack types, they are not tuned to the specific security issues common to WordPress plugins and themes.

Patchstack is created to specifically stop WordPress plugin and theme vulnerabilities in real time. Instead of relying on static signatures or generic rules, it applies targeted mitigation through virtual patches as soon as vulnerabilities are disclosed, before attackers can act.

Virtual patches are mitigation for a specific WordPress vulnerability. This offers protection to users while a plugin or theme developer can create a patch for the flaw. This approach addresses WordPress flaws in a way hosting companies and generic tools can’t because they rarely match generic attack patterns, so they slip past traditional defenses and expose publishers to privilege escalation, authentication bypasses, and site takeovers.

Takeaways

  • Standard hosting defenses fail against most WordPress plugin vulnerabilities (87.8% bypass rate).
  • Many providers claiming “virtual patching” (like Monarx and Imunify) did not stop WordPress-specific exploits.
  • Generic firewalls and WAFs caught some broad attacks (SQLi, XSS) but not WordPress-specific flaws tied to plugins and themes.
  • Patchstack consistently blocked vulnerabilities in real time, filling the gap left by network and server defenses.
  • WordPress’s plugin-heavy ecosystem makes it an especially attractive target for attackers, making effective vulnerability protection essential.

The case study by Patchstack shows that traditional hosting defenses and generic “virtual patching” solutions leave WordPress sites vulnerable, with nearly 88% of attacks bypassing firewalls and server-layer protections.

While providers like Cloudflare blocked some broad exploits, plugin-specific threats such as privilege escalation and authentication bypasses slipped through.

Patchstack was the only solution to consistently block these attacks in real time, giving site owners a dependable way to protect WordPress sites against the types of vulnerabilities that are most often targeted by attackers.

According to Patchstack:

“Don’t rely on generic defenses for WordPress. Patchstack is built to detect and block these threats in real-time, applying mitigation rules before attackers can exploit them.”

Read the results of the case study by Patchstack here.

Featured Image by Shutterstock/tavizta

Inspiro WordPress Theme Vulnerability Affects Over 70,000 Sites via @sejournal, @martinibuster

A vulnerability advisory was published for the Inspiro WordPress theme by WPZoom. The vulnerability arises due to a missing or incorrect security validation that enables an unauthenticated attacker to launch a Cross-Site Request Forgery (CSRF) attack.

Cross-Site Request Forgery (CSRF)

A CSRF vulnerability in the context of a WordPress site is an attack that relies on a user with admin privileges clicking a link, which in turn leverages that user’s credentials to execute a malicious action. The vulnerability has been assigned a CVSS threat rating of 8.1.

The advisory issued by Wordfence WordPress security company warned:

“This makes it possible for unauthenticated attackers to install plugins from the repository via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.”

The vulnerability affects Inspiro theme versions up to and including 2.1.2. Users are advised to update their theme to the latest version.

Featured Image by Shutterstock/Kazantseva Olga

Google Quietly Announces Search Partner Network Placement Visibility via @sejournal, @brookeosmundson

Google quietly rolled out a change advertisers have wanted for years: site-level reporting for the Search Partner Network.

Until now, advertisers could only opt in or out, with little understanding of where their ads actually showed.

This update finally gives visibility into where budgets are spent outside of Google.

Google lists this as an August 2025 update in its Help Center, however it wasn’t announced widespread.

Read on to understand the update from Google, how advertisers are reacting, and what you can do with this new level of information.

What Changed in Search Partner Reporting?

The new reporting applies to Search, Shopping, and App campaigns. You’ll now see which partner sites served your ads and how many impressions each one received.

Think of it as the kind of placement data we already get in Performance Max, just extended to Search Partners.

This update follows other moves Google has made to address long-standing concerns about partner quality.

Earlier this year, they introduced brand safety pre-screening options with IAS, DoubleVerify, and Zefr. They also said parked domains will be opted out by default before the end of 2025.

This visibility layer feels like the missing piece that makes the rest of those updates more usable.

How Are Advertisers Reacting to This Update?

The update on Search Partner Network reporting was first found by Anthony Higman, who took to X (formerly Twitter) to share his opinion.

Higman stated:

Still Most Likely Wont Be Participating In The Search Partner Network But This Is Unprecedented And What ALL Advertisers Have Been Requesting For Decades! Honestly NEVER Thought I Would See This Day.”

Others gave some versioning mixture of applauding Google for giving data to advertisers that they’ve been asking for for years, while also being somewhat skeptical.

Mike Ryan replied to Higman with his thoughts:

I mean, good step but also, it’s the PMax version: impression data only.

Aaron Levy shared his thoughts on LinkedIn, stating that this is a major step in the right direction for Google.

Why This Matters & How to Take Action

Without Search Partner Network reporting, it was tough to justify opting in. Now advertisers finally have data to audit where ads run, decide if it fits brand standards, and see if partner traffic adds any real value.

That said, the update is only as good as the action that advertisers take with the information available.

Some sites won’t align with brand guidelines. Others may generate clicks but fail to drive quality conversions.

The difference is you can now point to actual data when making decisions, rather than relying on gut feel.

Here’s some quick pointers to make this update actionable:

  • Run a quick placement audit. Pull the report and check for sites that don’t align with your brand. Exclude what’s clearly not a fit.
  • Look beyond impressions. While this reporting is only limited to impressions, use your own conversion data to figure out which placements are driving useful traffic versus noise.
  • Revisit opt-in of campaigns. Many advertisers avoided Search Partners altogether because of the black box. Now it may be worth testing again, but do it with defined guardrails and success metrics.
  • Pressure test Smart Bidding. Google leans on Smart Bidding to balance Search Partner performance, but don’t assume it’s perfect. Keep an eye on conversion quality and modeled conversions before scaling.

Final Thoughts

If you’ve been skeptical of Search Partners, this update is a chance to take another look with data on your side.

If you’ve already been opted in, you finally have a way to prove which placements help your campaigns and which ones don’t.

Bottom line: advertisers now have a long overdue view into the Search Partner Network. With more visibility comes a bit more control, and smarter conversations about whether Search Partners deserve a place in your Search campaigns.

Will you be opting into Search Partner Network with this new reporting update?

Ahrefs Launches Tracker Comparing ChatGPT & Google Referral Traffic via @sejournal, @MattGSouthern

Ahrefs released a public dashboard that tracks how much referral traffic websites receive from Google Search versus ChatGPT, with monthly updates.

The first dataset covers three complete months across 44,421 sites connected to Ahrefs’ free Web Analytics tool.

The Early Numbers

For July, the dashboard reports Google at 41.9% of total web traffic across the cohort and ChatGPT at 0.19%.

Month over month, Google grew 1.4% and ChatGPT grew 5.3%.

The prior month showed the reverse pattern: Google +6.8% and ChatGPT +1.6%. These swings show growth rates can vary by month even as Google’s share remains far larger. Ahrefs Traffic Analysis

The dashboard states:

“ChatGPT is growing 3.8x faster than Google.”

It adds:

“With 5.3% monthly growth vs Google’s 1.4% in the latest month, AI-powered search continues to evolve rapidly.”

And:

“ChatGPT now drives measurable referral traffic to websites, representing a new channel that didn’t exist 2 years ago.”

How The Data Is Collected

To keep the time series comparable, the tracker includes only sites that appear in all months. As the page explains:

“Our analysis tracks sites that appear in all months, ensuring statistically significant and reliable growth metrics.”

The page also lists the last update timestamp and confirms monthly updates.

Important Caveats

The dashboard measures referral traffic that arrives with a referrer.

Some AI systems and in-app browsers add noreferrer or otherwise strip referrers, which can undercount AI-originating visits.

Ahrefs has documented this analytics blind spot when measuring AI assistants and Google’s AI Mode. Keep that limitation in mind when comparing “AI search” activity to traditional search.

Scope matters too. The cohort is limited to sites using Ahrefs Web Analytics. Earlier Ahrefs research across different samples found AI referrals around 0.17% of the average site’s traffic, which is directionally consistent with the 0.19% shown here.

Looking Ahead

Google still sends the overwhelming share of visits in this dataset, and that reality should anchor your priorities. At the same time, ChatGPT’s July growth suggests an emerging, measurable channel you can evaluate with real data.

Use the tracker to watch how both lines move over time and adjust your testing accordingly.


Featured Image: JRdes/Shutterstock

WordPress Contact Form 7 Redirection Plugin Vulnerability Hits 300k Sites via @sejournal, @martinibuster

A vulnerability advisory was issued for a WordPress Contact Form 7 add-on plugin that enables unauthenticated attackers to “easily” launch a remote code execution. The vulnerability is rated high (8.8/10) on the CVSS threat severity scale.

Screenshot from Wordfence advisory showing 8.8 CVSS severity rating

Redirection for Contact Form 7 plugin

The vulnerability affects the Redirection for Contact Form 7 WordPress plugin, which is installed on over 300,000 websites. The plugin extends the functionality of the popular Contact Form 7 plugin. It enables a website publisher not only to redirect a user to another page but also to store the information in a database, send email notifications, and block spammy form submissions.

The vulnerability arises in a plugin function. WordPress functions are PHP code snippets that provide specific functionalities. The specific function that contains the flaw is called the delete_associated_files function. That function contains an insufficient file path validation flaw, which means it does not validate what a user can input into the function that deletes files. This flaw enables an attacker to specify a path to a file to be deleted.

Thus, an attacker can specify a path (such as ../../wp-config.php) and delete a critical file like wp-config.php, clearing the way for a remote code execution (RCE) attack. An RCE attack is a type of exploit that enables an attacker to execute malicious code remotely (from anywhere on the Internet) and gain control of the website.

The Wordfence advisory explains:

“This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).”

The vulnerability affects all versions of the plugin up to and including version 3.2.4. Users of the affected plugin are advised to update the plugin to the latest version.

Featured Image by Shutterstock/Everyonephoto Studio