Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Most browser extensions can access sensitive business data, a new report reveals
Global Security

Most browser extensions can access sensitive business data, a new report reveals

AdminBy AdminApril 15, 2025No Comments4 Mins Read
Browser Extensions Can Access Sensitive Enterprise Data
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 15, 2025Hacker NewsData Privacy / Enterprise Security

The browser extension can access sensitive business data

Everyone knows that the browser extension is built into almost the daily workflow of each user: from the spelling to the Genai tools. Most of them and security do not know that excessive browser permits are an increasing risk to organizations.

Layerx today announced the release of the enterprise Report on Browser Expanders 2025This report is the first and only report to combine public expansion statistics through the real world’s telemetry. By doing this, it sheds light on one of the most underestimated threat surfaces in modern cybersecurity: expansion of the browser.

The report shows several conclusions that IT and security executives will submit interesting because they are building their plans for H2 2025. This includes information and analysis of how many risky permits are given when expansion developers must trust and much more. Below we bring key statistics from the report.

Highlights from the Enterprise Browser Extension Report 2025

1. Extension of the browser ubiquitous in enterprises. 99%, almost all employees set the browser extension. 52% are installed more than 10 extensions.

Security analysis: Almost all employees are at risk of expanding the browser.

2. Most extensions can access critical data. 53% of business extensions can access sensitive data such as cookies, passwords, web pages, viewing information and more.

Security Analysis: A compromise at the level of employees may jeopardize the whole organization.

3. Who publishes these extensions? Who knows? More than half (54%) publishers are unknown and found only through Gmail. 79% of publishers published only one extension.

Security Analysis: Tracking extensions is difficult if possible with IT resources.

4. Expanding Genai – This is an increasing threat. More than 20% of users have at least one Genai extension, and 58% have high -risk resolution.

Security Analysis: Enterprises must determine the clear use of Genai expansion and exchange.

5. The necessary and unknown browser extensions are increasingly concerned. 51% of the extensions have not been updated for more than a year, and 26% of the enterprise extensions are loaded, bypassing even the main shop check.

Security Analysis: Expanders can be vulnerable, even if they are not purposefully harmful.

5 Safety Recommendations and IT

The report not only provides data, but also provides valid security recommendations and IT chamonds, recommending to fight the threat of browser expansion.

That’s what Layerx advises organizations:

  • Audit of all extensions – A complete picture of the extensions is the basis for understanding the surface of the threat. Thus, the first step in providing the height of the malicious browser is an audit of all extensions used by employees.
  • Classify extensions – Some types of extensions that make them attractive for the attack. This may be due to their extensive user base (such as Genai extensions) or with -the permits provided by such an extension. Categorizing extensions can help evaluate the browser security posture.
  • List permission permits – The next step is to list information about expanding information that can access. This helps further display the attack surface and set up a policy later.
  • Evaluate the risk of expanding – Now the time has come at risk. This means risk assessment for each extension based on their permits and information they can access. In addition, the risk assessment of the risk includes external parameters such as reputation, popularity, publisher and installation method. Together, these parameters must be combined into a single risk assessment.
  • Apply Adaptive, Based on Risk Execution – Finally, organizations can use their analysis to apply an adaptive, risk -based implementation policy, taking into account their use, needs and risk profile.

Access to the report

The browser extension is not just a performance tool, but also a vector of attack that most organizations do not know. The Layerx 2025 report provides comprehensive conclusions and analysis due to the data to help CISOS and security groups strengthen in this risk and create protection in the browser.

Download the full report.

Found this article interesting? This article is a contribution to one of our esteemed partners. Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.