• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
the 2024 browser security report uncovers how every web session

The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield

You are here: Home / General Cyber Security News / The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
May 13, 2024

With the browser becoming the most commonplace workspace in the enterprise, it is also turning into a popular attack vector for cyber attackers. From account takeovers to malicious extensions to phishing attacks, the browser is a usually means for stealing delicate facts and accessing organizational devices.

Security leaders who are planning their security architecture need information and insights into the browser risk landscape. Lately, LayerX released the “Yearly Browser Security Report 2024”, offering an in-depth evaluation of the evolving menace landscape for browser security.

This extensive report highlights the critical vulnerabilities and attack vectors that pose the biggest hazards to company security. It allows conclusion-makers and stakeholders to benchmark the security difficulties of their setting so they can make actionable conclusions. Under, we detail important conclusions from the report and a summarized record of security tips. We urge you to read through the complete report, which is prosperous in aspects, illustrations and supplemental sections we did not consist of in this report.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Essential Conclusions from the Report

  • Hybrid Operate Pitfalls – Unmanaged devices and own browser profiles are principal vectors for cyber threats, like data leakage and phishing. The risk is common – 62% of the workforce is making use of unmanaged equipment to access company data and 45% of all browsers inside of company units use individual profiles.
  • Browser Extension Threats – 33% of all extensions in an firm pose a large risk, with 1% of set up extensions known to be destructive. The report highlights how deceptive extensions are employed by attackers to hijack user knowledge and direct consumers to phishing web sites.
  • Shadow SaaS Pitfalls – The clandestine use of Shadow SaaS programs by workforce generates sizeable vulnerabilities, like blind spots and in id management.
  • Identification Vulnerabilities – Shared accounts and Single Sign-On (SSO) methods direct to improved threats of unauthorized obtain. Incidents like the 23andMe information breach spotlight the hazards of shared identities.
  • Gen-AI and LLM Vulnerabilities – 7.5% of workforce risk facts exposure by pasting or typing sensitive details into Generative AI resources like ChatGPT. There is a critical gap in the security group in being familiar with the risks affiliated with AI applications in corporate environments.
  • AI-Run Threats – AI can be made use of to enrich attacks, from malware to phishing to browser extension exploitation to provide chain attacks. These threats leverage AI-pushed personalization to make attacks additional convincing and complicated to detect, or they use AI algorithms to increase attacking abilities.
  • Unpatched Vulnerabilities – Unpatched vulnerabilities in browsers pose a considerable risk. There are variances in patching occasions between browsers.
  • Tips for Security Leaders

    To combat these threats, the report’s analysts recommend a multifaceted technique:

    • Update browsers consistently and thrust security patches instantly to mitigate dangers from out-of-date computer software.
    • Prohibit unauthorized extensions and on a regular basis overview permissions to avert information theft.
    • Educate staff to establish and report suspicious email messages and web sites.
    • Apply conditional access controls and boost very clear BYOD guidelines to protected particular devices made use of for do the job.
    • Enforce MFA and educate staff on password hygiene to greatly enhance account security.
    • Implement secure configurations and the whitelisting of extensions.
    • Prohibit obtain to delicate facts based mostly on consumer roles.
    • Use advanced instruments to detect and examine browser information for threats, ensuring proactive menace mitigation.

    Read through the Report

    The Yearly Browser Security Report is an vital resource for security leaders trying to find to fully grasp and mitigate browser-dependent pitfalls. By adopting the advised approaches, corporations can fortify their protection versus the increasingly subtle and threats targeting browsers. For even further insights, very best tactics and predictions, go through the report right here.

    Found this report intriguing? This report is a contributed piece from 1 of our valued partners. Follow us on Twitter  and LinkedIn to read extra distinctive material we put up.


    Some areas of this post are sourced from:
    thehackernews.com

    Previous Post: «shq response platform and risk centre to enable management and SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike
    Next Post: MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices mitre unveils emb3d: a threat modeling framework for embedded devices»

    Reader Interactions

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Primary Sidebar

    Report This Article

    Recent Posts

    • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
    • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
    • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
    • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
    • “Getting to Yes”: An Anti-Sales Guide for MSPs
    • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
    • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
    • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
    • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
    • 5 Threats That Reshaped Web Security This Year [2025]

    Copyright © TheCyberSecurity.News, All Rights Reserved.