Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Browser attacks target third-party apps like Salesforce

Enterprises face industrial-scale browser-based threats.

byKerem Gülen
September 5, 2025
in Cybersecurity

Security teams are increasingly recognizing the browser as the primary attack surface for business applications and data. Attackers target third-party apps and services, aiming to steal credentials, extract sensitive data, and monetize it—examples include recent Snowflake and Salesforce breaches.

Modern work environments, with decentralized apps and diverse communication channels, make users more accessible targets. Unlike the past, when email and endpoint security sufficed, business applications are now largely accessed through browsers, making them a central point for attacks.

Common browser-based threats

1. Phishing & session hijacking

Phishing has evolved beyond email. Attackers now exploit instant messaging, social media, SMS, in-app messages, and even SaaS notifications. Reverse-proxy “Attacker-in-the-Middle” (AitM) kits bypass most MFA methods, except passkeys, and often operate at industrial scale using obfuscation and runtime evasion.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

2. Malicious code delivery (ClickFix/FileFix)

Users are tricked into running malicious commands via browser prompts, clipboard instructions, or terminal commands. These attacks steal credentials, session cookies, and access to business apps. Browser-level detection can stop these attacks before they reach endpoints.

3. Malicious OAuth integrations

Attackers trick users into authorizing malicious apps, bypassing traditional login and MFA protections. Securing OAuth requires careful app management and visibility, which browser-based security tools can provide across all accessed apps.

4. Malicious browser extensions

Extensions can capture logins, session cookies, and browsing data. Attackers may compromise existing extensions or publish malicious ones. Monitoring installed extensions and their permissions is critical to mitigate risks.

5. Malicious file delivery

Files downloaded via browsers can contain client-side phishing pages or redirect users to malicious content. Recording downloads and analyzing browser activity adds a vital layer of protection.

Observing activity in the browser allows security teams to detect phishing, ClickFix, malicious OAuth, extensions, and risky logins in real time. It also provides insights into MFA gaps, credential theft, and apps lacking proper security configurations. By acting at the browser level, organizations can prevent attacks before they reach endpoints or compromise sensitive data.

Tags: CybersecurityFeatured

Related Posts

Chinese hackers use Claude to run large scale cyberespionage

Chinese hackers use Claude to run large scale cyberespionage

November 14, 2025
Hackers exploit Cisco and Citrix zero days to gain admin access

Hackers exploit Cisco and Citrix zero days to gain admin access

November 13, 2025
Microsoft uncovers Whisper Leak: A flaw that lets spies your AI chats

Microsoft uncovers Whisper Leak: A flaw that lets spies your AI chats

November 10, 2025
Google urges Gmail users to abandon passwords for passkeys

Google urges Gmail users to abandon passwords for passkeys

November 10, 2025
This Samsung Galaxy phone needs and immediate update

This Samsung Galaxy phone needs and immediate update

November 7, 2025
AMD confirms critical RDSEED flaw in Zen 5 CPUs

AMD confirms critical RDSEED flaw in Zen 5 CPUs

November 4, 2025

LATEST NEWS

Waterfall 2.0: AI brings back structured software development

Chinese hackers use Claude to run large scale cyberespionage

Google expands Pixel call recording to global users

Facebook levels up Marketplace with social features and AI support

NotebookLM gains automated research and wider file support

Tesla is reportedly testing Apple CarPlay integration

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.