The Cyberhaven attack is making headlines—but what could Cyberhaven and its customers have done to prevent it? Attack Context: https://lnkd.in/gqZCCDYh What Happeend? SquareX reported a large-scale attack targeting Chrome extensions. This is how it worked: - The Chrome Web Store publicly displays the developer’s email address on the extension’s page. - Attackers used that email to impersonate the Chrome Web Store and request urgent action. - By clicking the link in the email, the attackers attempted to gain permission to the developer’s Chrome Extension account. - The developer may have granted access, enabling the attacker to modify and push a malicious update to the extension. Here is video of the acttal attack we uncovered: https://lnkd.in/gHcqJasK What could have been done to stop this attack? (A) By Cyberhaven: (i) Restricting Risky OAuth Permissions Employees often click through SSO and OAuth screens, potentially granting permissions to unknown third-party apps. On the server side, this could be prevented by disallowing apps that request risky OAuth scopes unless they are authorized. While creating a whitelist isn’t always practical and can reduce productivity, a client-side Browser Detection-Response tool can step in. In the same post linked above, we detail how SquareX could have helped Cyberhaven and other organizations. (ii) Cyberhaven’s browser extension is primarily deployed in enterprise settings, so there is no strong need to host it on the Google Chrome Web Store. Many security extensions (like Cyberhaven) can be deployed via GPO/MDM, hosted on private URLs/stores. This approach removes the risk of a mass compromise like the one seen in this attack. (B) By Enterprises using Browser Extensions (i) Supply Chain Attack Awareness Browser extensions installed from the public Chrome Web Store are vulnerable to supply chain attacks. An extension may be malicious from the start, acquired by a malicious party later, or hijacked. To mitigate these risks, organizations need the ability to detect and block suspicious extensions—either at deployment time or dynamically whenever the extension starts exhibiting malicious behavior. SquareX has extensively researched how extensions can be exploited, including a cutting-edge talk at Defcon and identifying architectural issues in the new MV3 extension framework: Defcon talk: https://lnkd.in/gdKWmayt Darkreading coverage: https://lnkd.in/gt7-S29v Our detection capabilities: https://lnkd.in/gqMTe_tb If you want to learn more about protecting your enterprise, feel free to DM me or try us at www.sqrx.com SquareX - an industry-first Browser Detection-Response solution.
Importance of Browser Security for Enterprises
Explore top LinkedIn content from expert professionals.
Summary
In today’s enterprise landscape, browser security has become essential as browsers serve as the primary workspace for critical activities, making them a major target for cyber threats. Protecting browsers with advanced solutions can prevent data breaches, phishing attacks, and the exploitation of browser vulnerabilities.
- Implement strict extension policies: Allow only verified and trusted browser extensions to be installed to reduce vulnerabilities from external sources.
- Monitor browser sessions: Treat browsers as critical endpoints by enforcing session monitoring, blocking risky behaviors, and integrating data protection policies directly within browser activities.
- Raise user awareness: Conduct ongoing training to educate employees about phishing risks, secure browsing habits, and safe interactions with SaaS platforms.
-
-
Work starts in the browser. Does your security? Think about it. Email. Customer data. Payroll. Source code. Financial dashboards. Even generative AI prompts. For most organizations, the browser has quietly become the primary workspace—where business really gets done. But many security strategies still focus on network controls, endpoint agents, and MFA, while losing visibility into what happens inside the browser session itself. That’s exactly the gap attackers exploit. Phishing kits today steal session cookies to bypass MFA entirely. Shadow SaaS adoption flourishes without oversight. Employees paste sensitive customer data into AI tools without triggering any DLP policies. Data exfiltrates via copy/paste or downloads that standard controls can't see. These aren’t hypothetical problems. Contractors often keep SaaS sessions active on personal devices even after offboarding. Attackers buy stolen session tokens on the dark web to access your business-critical apps undetected. Forward-thinking security teams are closing this blind spot by treating the browser as a first-class endpoint. They're enforcing session monitoring, copy/paste and download restrictions, browser isolation for risky content, and integrated DLP policies that work inside SaaS apps. Because if work starts in the browser, your security strategy needs to start there too. How is your organization approaching this challenge? Let’s discuss.
-
Let’s face it—despite next-gen firewalls and endpoint protection, most breaches still start the old-fashioned way: through email and web browsers. Why? Because they’re the tools we use every day, and that makes them the easiest to exploit. The Problem ✔ Email is a hacker’s best friend—phishing, BEC scams, and weaponized attachments keep evolving. Even with filters, one cleverly disguised email can bypass defenses and trick even savvy users. ✔ Browsers are the wild west—malicious ads, drive-by downloads, and rogue extensions turn routine web browsing into a minefield. And with SaaS apps everywhere, employees are constantly logging into new (and sometimes risky) sites. Basic spam filters and antivirus won’t cut it anymore. Attackers use AI-generated messages, zero-day exploits, and social engineering to slip past traditional defenses. What Actually Works ✅ AI-powered email filtering that detects subtle phishing cues (not just obvious spam). ✅ Browser isolation or strict extension controls to stop malicious code before it executes. ✅ Zero Trust policies—because assuming "trusted" users or devices is a recipe for disaster. ✅ Ongoing security training—because human error is still the weakest link. The Bottom Line If your security strategy isn’t obsessed with locking down email and browsers, you’re leaving the front door wide open. #CyberSecurity #EmailSecurity #BrowserSecurity #ZeroTrust #Phishing
-
Strengthening Browser Security: Blocking External Extensions with Intune 🔐🌐 In today’s modern workplace, maintaining browser security is essential to protecting organizational data and ensuring compliance. One key area often overlooked is managing which extensions users can install — as untrusted extensions can introduce vulnerabilities and lead to data leakage. With Microsoft Intune, IT admins can now enforce extension controls in Microsoft Edge — allowing only approved, trusted extensions from official sources while blocking external or unauthorized installs. Why Managing Browser Extensions Matters: ✅ Prevent data leakage and mitigate security risks ✅ Enforce corporate security and compliance standards ✅ Reduce the attack surface introduced by unknown extensions ✅ Improve control and visibility over the browser environment In this guide, I walk you through how to configure the “Block External Extensions” policy in Microsoft Intune — step by step — using the Settings Catalog and modern MDM policies to better secure your endpoints and protect your users. 💬 How is your organization currently managing browser extension security? I’d love to hear your strategies in the comments below! #MicrosoftIntune #EndpointManagement #BrowserSecurity #EdgePolicy #CloudManagement #ModernWorkplace #M365Security
-
Is your browser your biggest blind spot? In today's dynamic, cloud-centric work environment, the browser has become the ubiquitous gateway to critical business applications. However, as revealed in my latest article for Forbes Tech Council, this essential tool often lacks the necessary security features, making it a prime target for sophisticated cyber threats. The rise of encrypted attacks, generative AI data exfiltration, SaaS sprawl, and browser-based attacks underscores the urgent need for a shift in how organizations approach browser security. It's no longer enough to focus solely on network and endpoint security. Organizations must elevate the browser into a secure workspace by adopting enterprise-grade solutions that offer comprehensive visibility, control, and advanced threat prevention. This includes securing all browser traffic, monitoring app usage, detecting advanced threats, and controlling data access. The future of security is browser-based. Investing in advanced browser security solutions is not just about protection; it's about empowering employees to work safely and confidently, driving innovation, and fostering a strong security culture. What are your thoughts on securing the browser in today's evolving threat landscape? https://lnkd.in/gnrd7siy