Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Most browser extensions can access sensitive business data, a new report reveals
Global Security

Most browser extensions can access sensitive business data, a new report reveals

AdminBy AdminApril 15, 2025No Comments4 Mins Read
Browser Extensions Can Access Sensitive Enterprise Data
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 15, 2025Hacker NewsData Privacy / Enterprise Security

The browser extension can access sensitive business data

Everyone knows that the browser extension is built into almost the daily workflow of each user: from the spelling to the Genai tools. Most of them and security do not know that excessive browser permits are an increasing risk to organizations.

Layerx today announced the release of the enterprise Report on Browser Expanders 2025This report is the first and only report to combine public expansion statistics through the real world’s telemetry. By doing this, it sheds light on one of the most underestimated threat surfaces in modern cybersecurity: expansion of the browser.

The report shows several conclusions that IT and security executives will submit interesting because they are building their plans for H2 2025. This includes information and analysis of how many risky permits are given when expansion developers must trust and much more. Below we bring key statistics from the report.

Highlights from the Enterprise Browser Extension Report 2025

1. Extension of the browser ubiquitous in enterprises. 99%, almost all employees set the browser extension. 52% are installed more than 10 extensions.

Security analysis: Almost all employees are at risk of expanding the browser.

2. Most extensions can access critical data. 53% of business extensions can access sensitive data such as cookies, passwords, web pages, viewing information and more.

Security Analysis: A compromise at the level of employees may jeopardize the whole organization.

3. Who publishes these extensions? Who knows? More than half (54%) publishers are unknown and found only through Gmail. 79% of publishers published only one extension.

Security Analysis: Tracking extensions is difficult if possible with IT resources.

4. Expanding Genai – This is an increasing threat. More than 20% of users have at least one Genai extension, and 58% have high -risk resolution.

Security Analysis: Enterprises must determine the clear use of Genai expansion and exchange.

5. The necessary and unknown browser extensions are increasingly concerned. 51% of the extensions have not been updated for more than a year, and 26% of the enterprise extensions are loaded, bypassing even the main shop check.

Security Analysis: Expanders can be vulnerable, even if they are not purposefully harmful.

5 Safety Recommendations and IT

The report not only provides data, but also provides valid security recommendations and IT chamonds, recommending to fight the threat of browser expansion.

That’s what Layerx advises organizations:

  • Audit of all extensions – A complete picture of the extensions is the basis for understanding the surface of the threat. Thus, the first step in providing the height of the malicious browser is an audit of all extensions used by employees.
  • Classify extensions – Some types of extensions that make them attractive for the attack. This may be due to their extensive user base (such as Genai extensions) or with -the permits provided by such an extension. Categorizing extensions can help evaluate the browser security posture.
  • List permission permits – The next step is to list information about expanding information that can access. This helps further display the attack surface and set up a policy later.
  • Evaluate the risk of expanding – Now the time has come at risk. This means risk assessment for each extension based on their permits and information they can access. In addition, the risk assessment of the risk includes external parameters such as reputation, popularity, publisher and installation method. Together, these parameters must be combined into a single risk assessment.
  • Apply Adaptive, Based on Risk Execution – Finally, organizations can use their analysis to apply an adaptive, risk -based implementation policy, taking into account their use, needs and risk profile.

Access to the report

The browser extension is not just a performance tool, but also a vector of attack that most organizations do not know. The Layerx 2025 report provides comprehensive conclusions and analysis due to the data to help CISOS and security groups strengthen in this risk and create protection in the browser.

Download the full report.

Found this article interesting? This article is a contribution to one of our esteemed partners. Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025

Openai prohibits chatgpt accounts used by Russian, Iranian and Chinese hacking groups

June 9, 2025

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025

Openai prohibits chatgpt accounts used by Russian, Iranian and Chinese hacking groups

June 9, 2025

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.