Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Why so many people get hacked by government spyware

Understanding the UK’s eternal chemical problem

Scribe, working to show where AI really pays dividends, hits $1.3 billion valuation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Browser Security Report Reveals New Threats to Enterprises
Identity

New Browser Security Report Reveals New Threats to Enterprises

userBy userNovember 10, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

According to the new Browser Security Report 2025, security leaders are realizing that most identity, SaaS, and AI-related risks are concentrated in one place: the user’s browser. However, traditional controls such as DLP, EDR, and SSE still operate one layer below.

What is revealed is more than just a blind spot. This is the surface of parallel threats such as unmanaged extensions that act like supply chain implants, GenAI tools accessed through personal accounts, sensitive data copied/pasted directly into prompt fields, and sessions that bypass SSO entirely.

This article identifies key findings from the report and what they reveal about the changing locus of control in enterprise security.

GenAI is now the top data extraction channel

The rise of GenAI in enterprise workflows is creating a significant governance gap. Almost half of employees use GenAI tools, but most do so outside of IT visibility and through unmanaged accounts.

Key statistics of the report:

77% of employees paste data into GenAI prompts 82% of those pastes are from personal accounts 40% of uploaded files contain PII or PCI GenAI accounts for 32% of all business-to-personal data movements

Traditional DLP tools weren’t designed for this. Browsers are the primary channel for copy/paste exfiltration, with no oversight or policies.

AI browsers are a new threat surface

Another emerging browser-based threat surface is “agent” AI browsers. This blends the traditional security risks of browsers with new concerns about the use of AI.

AI browsers like OpenAI’s Atlas, Arc Search, and Perplexity Browser are redefining the way users interact with the web, combining search, chat, and browsing into one intelligent experience. These browsers integrate large-scale language models directly into the browsing layer, allowing you to read, summarize, and reason about any page or tab in real time. For users, this means seamless productivity and context-sensitive assistance. But for enterprises, this represents a new attack surface that is largely unmonitored. It’s an “always-on co-pilot” that silently monitors and processes everything your employees can do, without enforcing policies or having visibility into what’s being shared with the cloud.

The risks are significant and multifaceted. Session memory leaks expose sensitive data through AI-powered personalization. An invisible “auto-prompt” sends the page’s content to a third-party model. Shared cookies also blur the lines of identity, opening the door to hijacking. Lacking enterprise-grade guardrails, these AI browsers effectively bypass traditional DLP, SSE, and browser security tools, creating a fileless and invisible data exfiltration path. As organizations adopt GenAI and SaaS-driven workflows, understanding and addressing this new blind spot is critical to preventing next-generation data leaks and identity compromises.

Browser extensions: the most widespread and least managed supply chain

99% of enterprise users have at least one extension installed. More than half have granted high or significant privileges. Many are sideloaded or published by Gmail accounts without verification, updates, or accountability.

From telemetry:

26% of extensions are sideloaded 54% are published by Gmail accounts 51% haven’t been updated in more than a year 6% of GenAI-related extensions are classified as malicious

This is no longer a productivity issue, but an unmanaged software supply chain embedded in every endpoint.

Identity governance ends at the IdP. The risk starts in your browser.

According to the report, more than two-thirds of logins occur outside of SSO, and nearly half use personal credentials, making it impossible for security teams to know who is accessing what and from where.

break:

68% of corporate logins are done without SSO 43% of SaaS logins are using personal accounts 26% of users reuse passwords across multiple accounts 8% of browser extensions have access to users’ IDs or cookies

Attacks like Scattered Spider have proven this. Browser session tokens are now the primary target, rather than passwords.

SaaS and messaging apps secretly extract sensitive data

Workflows that once relied on file uploads are moving to browser-based paste, AI prompts, and third-party plugins. Most of this activity now occurs in the browser layer rather than in the app.

Observed behavior:

62% of pastes to messaging apps contain PII/PCI 87% of them occur via non-corporate accounts On average, users paste 4 sensitive snippets into non-corporate tools per day

In incidents like the Ripling/Deel leak, the breach did not involve malware or phishing, but rather originated from an unmonitored chat app within the browser.

Traditional tools were not built for this layer

EDR is process aware. SSE is aware of network traffic. DLP scans files. There’s nothing to inspect what’s happening within the session, such as which SaaS tabs are open, what data is pasted, or which extensions are injecting scripts.

Security teams don’t know that:

Using Shadow AI and prompting Modifying extension activity and code Crossover between personal and corporate accounts Session hijacking and cookie theft

Therefore, new approaches are needed to secure browsers.

Session-native controls are the next frontier

To take back control, security teams need browser-native visibility, the ability to operate at the session level without disrupting the user experience.

This includes:

Monitor copy/paste and uploads between apps Detect unmanaged GenAI tools and extensions Enforce session isolation and SSO everywhere Apply DLP to non-file-based interactions

Modern browser security platforms, such as those outlined throughout the report, can provide these controls without forcing users into a new browser.

Read the full report to see what blind spots you’re missing

The Browser Security Report 2025 provides rich data on how browsers have become the most critical and vulnerable endpoints within enterprises. Using insights from millions of real browser sessions, we map where today’s controls fail and where the latest breaches begin.

Download the full report to find out what traditional management is missing and what top CISOs are doing next.

Was this article interesting? This article is a contribution from one of our valued partners. Follow us on Google News, Twitter, and LinkedIn to read more exclusive content from us.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe science of EV weight reduction
Next Article Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More
user
  • Website

Related Posts

Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

November 10, 2025

Massive ClickFix phishing attack using PureRAT malware targets hotel systems

November 10, 2025

GlassWorm malware found in three VS Code extensions that were installed thousands of times

November 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Why so many people get hacked by government spyware

Understanding the UK’s eternal chemical problem

Scribe, working to show where AI really pays dividends, hits $1.3 billion valuation

6Sense founder Amanda Carlow raises $30 million for new human-replacement AI sales startup 1Mind

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.