Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Browser attacks target third-party apps like Salesforce

Enterprises face industrial-scale browser-based threats.

byKerem Gülen
September 5, 2025
in Cybersecurity

Security teams are increasingly recognizing the browser as the primary attack surface for business applications and data. Attackers target third-party apps and services, aiming to steal credentials, extract sensitive data, and monetize it—examples include recent Snowflake and Salesforce breaches.

Modern work environments, with decentralized apps and diverse communication channels, make users more accessible targets. Unlike the past, when email and endpoint security sufficed, business applications are now largely accessed through browsers, making them a central point for attacks.

Common browser-based threats

1. Phishing & session hijacking

Phishing has evolved beyond email. Attackers now exploit instant messaging, social media, SMS, in-app messages, and even SaaS notifications. Reverse-proxy “Attacker-in-the-Middle” (AitM) kits bypass most MFA methods, except passkeys, and often operate at industrial scale using obfuscation and runtime evasion.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

2. Malicious code delivery (ClickFix/FileFix)

Users are tricked into running malicious commands via browser prompts, clipboard instructions, or terminal commands. These attacks steal credentials, session cookies, and access to business apps. Browser-level detection can stop these attacks before they reach endpoints.

3. Malicious OAuth integrations

Attackers trick users into authorizing malicious apps, bypassing traditional login and MFA protections. Securing OAuth requires careful app management and visibility, which browser-based security tools can provide across all accessed apps.

4. Malicious browser extensions

Extensions can capture logins, session cookies, and browsing data. Attackers may compromise existing extensions or publish malicious ones. Monitoring installed extensions and their permissions is critical to mitigate risks.

5. Malicious file delivery

Files downloaded via browsers can contain client-side phishing pages or redirect users to malicious content. Recording downloads and analyzing browser activity adds a vital layer of protection.

Observing activity in the browser allows security teams to detect phishing, ClickFix, malicious OAuth, extensions, and risky logins in real time. It also provides insights into MFA gaps, credential theft, and apps lacking proper security configurations. By acting at the browser level, organizations can prevent attacks before they reach endpoints or compromise sensitive data.

Tags: CybersecurityFeatured

Related Posts

AMD confirms critical RDSEED flaw in Zen 5 CPUs

AMD confirms critical RDSEED flaw in Zen 5 CPUs

November 4, 2025
DOJ indicts DigitalMint and Sygnia employees for orchestrating ransomware attacks

DOJ indicts DigitalMint and Sygnia employees for orchestrating ransomware attacks

November 4, 2025
WhatsApp introduces passkeys for end-to-end encrypted chat backups

WhatsApp introduces passkeys for end-to-end encrypted chat backups

October 30, 2025
Azure outage: Microsoft blames Azure Front Door for major global disruption

Azure outage: Microsoft blames Azure Front Door for major global disruption

October 30, 2025
183M Gmail passwords exposed via infostealer malware

183M Gmail passwords exposed via infostealer malware

October 28, 2025
Google’s Live Threat Detection is reportedly coming to more Android phones

Google’s Live Threat Detection is reportedly coming to more Android phones

October 23, 2025

LATEST NEWS

EA servers are down: FC 26 maintenance timetable

Netflix to stream video podcasts in 2026

Google Maps integrates Gemini for hands-free navigation

Sony unlocks PS5 game streaming on Portal for PS Plus Premium users

Sony launches world’s first ethical bias benchmark for AI images

Nintendo expands its store app beyond Japan to global markets

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.