Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Browser attacks target third-party apps like Salesforce

Enterprises face industrial-scale browser-based threats.

byKerem Gülen
September 5, 2025
in Cybersecurity
Home News Cybersecurity

Security teams are increasingly recognizing the browser as the primary attack surface for business applications and data. Attackers target third-party apps and services, aiming to steal credentials, extract sensitive data, and monetize it—examples include recent Snowflake and Salesforce breaches.

Modern work environments, with decentralized apps and diverse communication channels, make users more accessible targets. Unlike the past, when email and endpoint security sufficed, business applications are now largely accessed through browsers, making them a central point for attacks.

Common browser-based threats

1. Phishing & session hijacking

Phishing has evolved beyond email. Attackers now exploit instant messaging, social media, SMS, in-app messages, and even SaaS notifications. Reverse-proxy “Attacker-in-the-Middle” (AitM) kits bypass most MFA methods, except passkeys, and often operate at industrial scale using obfuscation and runtime evasion.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

2. Malicious code delivery (ClickFix/FileFix)

Users are tricked into running malicious commands via browser prompts, clipboard instructions, or terminal commands. These attacks steal credentials, session cookies, and access to business apps. Browser-level detection can stop these attacks before they reach endpoints.

3. Malicious OAuth integrations

Attackers trick users into authorizing malicious apps, bypassing traditional login and MFA protections. Securing OAuth requires careful app management and visibility, which browser-based security tools can provide across all accessed apps.

4. Malicious browser extensions

Extensions can capture logins, session cookies, and browsing data. Attackers may compromise existing extensions or publish malicious ones. Monitoring installed extensions and their permissions is critical to mitigate risks.

5. Malicious file delivery

Files downloaded via browsers can contain client-side phishing pages or redirect users to malicious content. Recording downloads and analyzing browser activity adds a vital layer of protection.

Observing activity in the browser allows security teams to detect phishing, ClickFix, malicious OAuth, extensions, and risky logins in real time. It also provides insights into MFA gaps, credential theft, and apps lacking proper security configurations. By acting at the browser level, organizations can prevent attacks before they reach endpoints or compromise sensitive data.

Tags: CybersecurityFeatured

Related Posts

Co-op Group reports £75m loss after April cyber-attack

Co-op Group reports £75m loss after April cyber-attack

September 25, 2025
Taiwan industrial production up 14.4% in August thanks to AI chips

Taiwan industrial production up 14.4% in August thanks to AI chips

September 25, 2025
LastPass: GitHub hosts atomic stealer malware campaign

LastPass: GitHub hosts atomic stealer malware campaign

September 25, 2025
Sentinelone finds malterminal malware using OpenAI GPT-4

Sentinelone finds malterminal malware using OpenAI GPT-4

September 23, 2025
FBI warns of fake IC3 websites stealing data

FBI warns of fake IC3 websites stealing data

September 23, 2025
Radware finds ChatGPT deep research ShadowLeak zero-click flaw

Radware finds ChatGPT deep research ShadowLeak zero-click flaw

September 23, 2025

LATEST NEWS

Co-op Group reports £75m loss after April cyber-attack

Taiwan industrial production up 14.4% in August thanks to AI chips

Nansen AI launches agent for on-chain Ethereum insights

Apple: DMA delays iPhone mirroring and AirPods live translation in EU

LastPass: GitHub hosts atomic stealer malware campaign

Nintendo’s Fire Emblem Shadows brings Among Us–style deception to RPG battles

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.