Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

From Forests to Files: The Hidden Environmental Costs of Paper

Convert cybersecurity practices into MRR machines

Ukevents seeks national event strategy

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » A large portion of browser extensions can access sensitive enterprise data, a new report found
Identity

A large portion of browser extensions can access sensitive enterprise data, a new report found

userBy userApril 15, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 15, 2025Hacker NewsData Privacy/Enterprise Security

Browser extensions allow you to access sensitive enterprise data

We know that browser extensions are embedded in the daily workflows of almost every user, from spell checkers to Genai tools. What IT and security people don’t know is that excessive permissions for browser extensions are an increased risk for organizations.

Layerx today announced the release of Enterprise Browser Extension Security Report 2025. This report is the first and only report that integrates public extension marketplace statistics with actual enterprise usage telemetry. In doing so, it sheds light on one of the most underrated threat surfaces in modern cybersecurity: browser extensions.

The report reveals some findings that IT and security leaders find interesting to build plans for H2 2025. This includes information and analysis, such as the number of extensions with risky permissions, such as when extension developers are trusted. Below are some important statistics from the report.

Highlights of Enterprise Browser Extended Security Report 2025

1. Browser extensions are ubiquitous in enterprise environments. Almost all employees have a browser extension installed. 52% have installed over 10 extensions.

Security Analysis: Almost every employee is at risk of browser extensions.

2. Most extensions have access to important data. 53% of enterprise users’ extensions have access to sensitive data such as cookies, passwords, web page content, browsing information and more.

Security Analysis: Employee-level compromises can put an entire organization at risk.

3. Who will publish these extensions? who knows? Over half (54%) of extension publishers are unknown and are only identified in Gmail. 79% of publishers have only published one extension.

Security Analysis: Tracking the reputation of an extension is difficult if it is possible with IT resources.

4. Genai expansion is an increasing threat. Over 20% of users have at least one Genai extension, and 58% of these have a high-risk permission scope.

Security Analysis: Companies need to define clear policies regarding the use of Genai extensions and data sharing.

5. Unmaintained, unknown browser extensions are growing concern. 51% of extensions have not been updated for more than a year, 26% of enterprise extensions are sideloaded, and basic store reviews have also been bypassed.

Security Analysis: Extensions are vulnerable even if the extension is intentionally unmalicious.

Five Security and IT Recommendations

Not only does this report bring data, it also provides actionable guidance for security and IT teams, and recommends ways to address the threats of browser extensions.

Here’s what Layerx advises your organization:

Audit all extensions – The overall picture of extensions is the foundation for understanding the threat surface. So the first step to protecting malicious browser extensions is to audit all extensions that employees use. Extension Classification – A certain type of extension that is attractive to attack. This could be due to a wide user base (such as Genai Extensions) or the privileges granted to such extensions. Extension classification helps you assess your browser extension security attitude. Enumerate Extension Permissions – The next step is to list the information extensions you can access. This will help you further map offensive surfaces and configure your policy later. Evaluating Extended Risks – Now is the time to manage your risk. This means assessing the risk of each extension based on permissions and information that it has access to. Additionally, the overall risk assessment includes external parameters such as reputation, popularity, publisher, and installation method. Together, these parameters must be combined into a unified risk score. Apply adaptive, risk-based enforcement – Finally, organizations can use analysis to apply adaptive, risk-based enforcement policies tailored to their usage, needs and risk profiles.

Access the report

Browser extensions are not just productivity tools, they are attack vectors that most organizations do not exist. Layerx’s 2025 report provides comprehensive findings and data-driven analytics to help CISOs and security teams reduce this risk and build a defensible browser environment.

Download the full report.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleApple details its plans to improve its AI model by personally analyzing user data
Next Article Squid Game: Experience opening with Immerse LDN
user
  • Website

Related Posts

Convert cybersecurity practices into MRR machines

June 16, 2025

Malicious PYPI packages pretend to be chimeric modules for stealing AWS, CI/CD, and MACOS data

June 16, 2025

Discord Invite Link Hijacking offers Asyncrat and Skuld Stealer targeted at crypto wallets

June 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

From Forests to Files: The Hidden Environmental Costs of Paper

Convert cybersecurity practices into MRR machines

Ukevents seeks national event strategy

EU nuclear development requires an investment of 241 billion euros by 2050

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

From Forests to Files: The Hidden Environmental Costs of Paper

Ranking 5 casino games from the easiest to the hardest

Top 10 Startup and Tech Funding News for the Week Ending June 13, 2025

Brazilian Melluses raised $32 million to buy Bitcoin, becoming the country’s first “Bitcoin Treasury” Fintech

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.