Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Browser attacks target third-party apps like Salesforce

Enterprises face industrial-scale browser-based threats.

byKerem Gülen
September 5, 2025
in Cybersecurity

Security teams are increasingly recognizing the browser as the primary attack surface for business applications and data. Attackers target third-party apps and services, aiming to steal credentials, extract sensitive data, and monetize it—examples include recent Snowflake and Salesforce breaches.

Modern work environments, with decentralized apps and diverse communication channels, make users more accessible targets. Unlike the past, when email and endpoint security sufficed, business applications are now largely accessed through browsers, making them a central point for attacks.

Common browser-based threats

1. Phishing & session hijacking

Phishing has evolved beyond email. Attackers now exploit instant messaging, social media, SMS, in-app messages, and even SaaS notifications. Reverse-proxy “Attacker-in-the-Middle” (AitM) kits bypass most MFA methods, except passkeys, and often operate at industrial scale using obfuscation and runtime evasion.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

2. Malicious code delivery (ClickFix/FileFix)

Users are tricked into running malicious commands via browser prompts, clipboard instructions, or terminal commands. These attacks steal credentials, session cookies, and access to business apps. Browser-level detection can stop these attacks before they reach endpoints.

3. Malicious OAuth integrations

Attackers trick users into authorizing malicious apps, bypassing traditional login and MFA protections. Securing OAuth requires careful app management and visibility, which browser-based security tools can provide across all accessed apps.

4. Malicious browser extensions

Extensions can capture logins, session cookies, and browsing data. Attackers may compromise existing extensions or publish malicious ones. Monitoring installed extensions and their permissions is critical to mitigate risks.

5. Malicious file delivery

Files downloaded via browsers can contain client-side phishing pages or redirect users to malicious content. Recording downloads and analyzing browser activity adds a vital layer of protection.

Observing activity in the browser allows security teams to detect phishing, ClickFix, malicious OAuth, extensions, and risky logins in real time. It also provides insights into MFA gaps, credential theft, and apps lacking proper security configurations. By acting at the browser level, organizations can prevent attacks before they reach endpoints or compromise sensitive data.

Tags: CybersecurityFeatured

Related Posts

Microsoft’s biggest-ever Patch Tuesday fixes 175 bugs

Microsoft’s biggest-ever Patch Tuesday fixes 175 bugs

October 15, 2025
Attackers used AI prompts to silently exfiltrate code from GitHub repositories

Attackers used AI prompts to silently exfiltrate code from GitHub repositories

October 15, 2025
Android 16 now shows which apps sneak in your security settings

Android 16 now shows which apps sneak in your security settings

October 15, 2025
4 Samsung Galaxy models just lost all software support

4 Samsung Galaxy models just lost all software support

October 15, 2025
This is what caused global Vodafone outage

This is what caused global Vodafone outage

October 15, 2025
Researchers warn of 100K-node botnet exploiting Remote Desktop vulnerabilities

Researchers warn of 100K-node botnet exploiting Remote Desktop vulnerabilities

October 14, 2025

LATEST NEWS

Microsoft’s biggest-ever Patch Tuesday fixes 175 bugs

Jensen Huang says every Nvidia engineer now codes with Cursor

Apple unveils new iPad Pro with the M5 chip

Apple Vision Pro gets M5 chip upgrade and PS VR2 controller support

Attackers used AI prompts to silently exfiltrate code from GitHub repositories

Android 16 now shows which apps sneak in your security settings

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.