Friday, 8 May 2026
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
logo logo
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
  • 🔥
  • Trump
  • House
  • ScienceAlert
  • White
  • VIDEO
  • man
  • Trumps
  • Season
  • star
  • Years
Font ResizerAa
American FocusAmerican Focus
Search
  • World
  • Politics
  • Crime
  • Economy
  • Tech & Science
  • Sports
  • Entertainment
  • More
    • Education
    • Celebrities
    • Culture and Arts
    • Environment
    • Health and Wellness
    • Lifestyle
Follow US
© 2024 americanfocus.online – All Rights Reserved.
American Focus > Blog > Tech and Science > Browser-based attacks hit 95% of enterprises — and traditional security tools never saw them coming
Tech and Science

Browser-based attacks hit 95% of enterprises — and traditional security tools never saw them coming

Last updated: January 26, 2026 11:40 am
Share
Browser-based attacks hit 95% of enterprises — and traditional security tools never saw them coming
SHARE

The cybersecurity landscape is evolving rapidly, with browser-based attacks becoming increasingly prevalent. A recent Omdia study revealed that 95% of organizations experienced browser-based attacks last year, despite having robust security measures in place. Three high-profile campaigns in the past year have shed light on the severity of the threat posed by browser-based attacks.

ShadyPanda, Cyberhaven, and Trust Wallet are just a few examples of how attackers are exploiting vulnerabilities within browsers to infiltrate organizations and steal sensitive data. These attacks are not triggered by traditional security alerts, making them difficult to detect using conventional security tools.

According to Sam Evans, the CISO of Clearwater Analytics, the majority of employees spend a significant portion of their day using a web browser. This makes the browser a high-risk execution environment that is often overlooked as an attack surface. Modern adversaries are leveraging trusted browser sessions to bypass traditional security controls and gain access to sensitive information.

Elia Zaitsev, the CTO of CrowdStrike, highlights the shift in attacker tactics, noting that attackers are now focusing on exploiting valid identities, tokens, and access within trusted browser sessions. Traditional security architectures are ill-equipped to detect and prevent these types of attacks, as they were designed to inspect traffic before authentication, not behavior after access is granted.

The Omdia research underscores the limitations of traditional security stacks, with a significant percentage of encrypted traffic going uninspected and organizations lacking control over data shared in AI tools. The proliferation of browser extensions further complicates the security landscape, with many users unknowingly granting high-level permissions to extensions that can compromise their data.

See also  Noah Schnapp on Will Coming Out as Gay in Stranger Things 5

Browser isolation solutions offered by companies like Menlo Security, Cloudflare, and Symantec aim to address rendering threats by executing web content in remote containers. However, these solutions do not protect against locally-run extensions with privileged access or session-based attacks that hijack authenticated tokens.

Three distinct attack patterns have emerged in recent years, including the long game, credential hijack, and API key leak. These attacks exploit vulnerabilities in browser extensions, auto-update mechanisms, and control planes to gain unauthorized access to sensitive data.

To combat these evolving threats, organizations must adopt browser-layer controls that provide visibility and control inside live browser sessions. By correlating browser behavior with identity posture, endpoint signals, and threat intelligence, organizations can detect and prevent session hijacking and data exfiltration in real-time.

Ultimately, the key to mitigating browser-based attacks lies in understanding the unique challenges posed by the modern browser environment and implementing proactive security measures that prioritize visibility and control. By treating the browser as the primary execution environment for enterprise work, organizations can enhance their cybersecurity posture and protect against emerging threats.

TAGGED:attacksBrowserbasedComingenterpriseshitSecuritytoolsTraditional
Share This Article
Twitter Email Copy Link Print
Previous Article Endometriosis, flu updates, autism research: Morning Rounds Endometriosis, flu updates, autism research: Morning Rounds
Next Article Women Who Defined Last Week’s Fashion Moments Women Who Defined Last Week’s Fashion Moments
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.

Popular Posts

Paris Saint-Germain vs. Arsenal, where to watch, live stream: Champions League prediction, odds, lineups

Final thoughtsWith a spot in the Champions League final on the line, both PSG and…

May 7, 2025

American Airlines restores forecast, Tesla stock falls in wake of earnings miss

Tesla (TSLA) stock initially saw a 1% spike following the release of its second quarter…

July 24, 2025

Residents Are Up In Arms Over Stella McCartney’s Plans For A Lavish Rural Pad

Controversy Surrounds Stella McCartney's Plans for Striking House in Rural Retreat Plans for a new…

March 14, 2025

Iran Fires Retaliatory Strike Against U.S. Base in Qatar

Iran Launches Attack On U.S. Base In Middle East ... After American Offensive Published June…

June 23, 2025

JoJo’s Memoir ‘Over the Influence’: Biggest Bombshells

JoJo, whose real name is Joanna Noëlle Levesque, recently released her memoir titled "Over the…

October 3, 2024

You Might Also Like

What Are You Actually Swallowing When You Take Probiotics? : ScienceAlert
Tech and Science

What Are You Actually Swallowing When You Take Probiotics? : ScienceAlert

May 8, 2026
Cloudflare says AI made 1,100 jobs obsolete, even as revenue hit a record high
Tech and Science

Cloudflare says AI made 1,100 jobs obsolete, even as revenue hit a record high

May 8, 2026
U.S. neutrino megaproject takes shape in abandoned gold mine
Tech and Science

U.S. neutrino megaproject takes shape in abandoned gold mine

May 8, 2026
Anthropic Skill scanners passed every check. The malicious code rode in on a test file.
Tech and Science

Anthropic Skill scanners passed every check. The malicious code rode in on a test file.

May 8, 2026
logo logo
Facebook Twitter Youtube

About US


Explore global affairs, political insights, and linguistic origins. Stay informed with our comprehensive coverage of world news, politics, and Lifestyle.

Top Categories
  • Crime
  • Environment
  • Sports
  • Tech and Science
Usefull Links
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA

© 2024 americanfocus.online –  All Rights Reserved.

Welcome Back!

Sign in to your account

Lost your password?