Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Browser attacks target third-party apps like Salesforce

Enterprises face industrial-scale browser-based threats.

byKerem Gülen
September 5, 2025
in Cybersecurity
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Security teams are increasingly recognizing the browser as the primary attack surface for business applications and data. Attackers target third-party apps and services, aiming to steal credentials, extract sensitive data, and monetize it—examples include recent Snowflake and Salesforce breaches.

Modern work environments, with decentralized apps and diverse communication channels, make users more accessible targets. Unlike the past, when email and endpoint security sufficed, business applications are now largely accessed through browsers, making them a central point for attacks.

Common browser-based threats

1. Phishing & session hijacking

Phishing has evolved beyond email. Attackers now exploit instant messaging, social media, SMS, in-app messages, and even SaaS notifications. Reverse-proxy “Attacker-in-the-Middle” (AitM) kits bypass most MFA methods, except passkeys, and often operate at industrial scale using obfuscation and runtime evasion.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

2. Malicious code delivery (ClickFix/FileFix)

Users are tricked into running malicious commands via browser prompts, clipboard instructions, or terminal commands. These attacks steal credentials, session cookies, and access to business apps. Browser-level detection can stop these attacks before they reach endpoints.

3. Malicious OAuth integrations

Attackers trick users into authorizing malicious apps, bypassing traditional login and MFA protections. Securing OAuth requires careful app management and visibility, which browser-based security tools can provide across all accessed apps.

4. Malicious browser extensions

Extensions can capture logins, session cookies, and browsing data. Attackers may compromise existing extensions or publish malicious ones. Monitoring installed extensions and their permissions is critical to mitigate risks.

5. Malicious file delivery

Files downloaded via browsers can contain client-side phishing pages or redirect users to malicious content. Recording downloads and analyzing browser activity adds a vital layer of protection.

Observing activity in the browser allows security teams to detect phishing, ClickFix, malicious OAuth, extensions, and risky logins in real time. It also provides insights into MFA gaps, credential theft, and apps lacking proper security configurations. By acting at the browser level, organizations can prevent attacks before they reach endpoints or compromise sensitive data.

Tags: CybersecurityFeatured

Related Posts

AWS outage disrupts Fortnite and Steam

AWS outage disrupts Fortnite and Steam

December 25, 2025
Aflac data breach affected 22.65M customers

Aflac data breach affected 22.65M customers

December 24, 2025
Nissan data breach is real and you might be affected

Nissan data breach is real and you might be affected

December 23, 2025
Spotify data breach: 86 million audio files leaked online

Spotify data breach: 86 million audio files leaked online

December 22, 2025
Google-featured VPN extension harvested and sold ChatGPT and Claude conversations

Google-featured VPN extension harvested and sold ChatGPT and Claude conversations

December 19, 2025
Cisco tells customers to wipe and rebuild hacked appliances

Cisco tells customers to wipe and rebuild hacked appliances

December 18, 2025

LATEST NEWS

Stock watch: Nvidia, Samsung, AMD, and Intel updates (December 26)

OnePlus Turbo spotted with 9000 mAh battery

5 essential Mac apps to transform your productivity in 2026

One year in Tiangong: China to test long-duration space stay in 2026

Google NotebookLM introduces “Lecture Mode” for 30-minute AI learning

ChatGPT evolves into an office suite with new formatting blocks

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI tools
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.