mastodon.uno è uno dei tanti server Mastodon indipendenti che puoi usare per partecipare al fediverso.
Mastodon.Uno è la principale comunità mastodon italiana. Con 77.000 iscritti è il più grande nodo Mastodon italiano: anima ambientalista a supporto della privacy e del mondo Open Source.

Statistiche del server:

6,2K
utenti attivi

#browsersecurity

1 post1 partecipante0 post oggi

In other news, I'm speaking at #Authcon, a new CIAM-focused event happening inside APIDays NYC from May 14 to 15.

I'll be talking about how browsers have become gatekeepers for login and what that means for authentication, identity, and even payments.

It’s not all FUD, either! There are real opportunities here, if you’re paying attention.

Reg link + special code in the thread. It doesn’t unlock a discount, but it does prove I'm a helpful human.

Hey folks,

Just stumbled upon some interesting stuff regarding browser security. It's pretty wild how many attacks are actually funneled through browsers nowadays. 🤯 The real kicker? A lot of companies seem to have a massive blind spot when it comes to this.

Sure, having a firewall and antivirus is crucial, that's standard stuff. But what about the jungle of browser extensions everyone's using? Seriously, who's keeping tabs on those? And then there's phishing – that tricky Google Docs phishing scheme is definitely the new headache on the block! 🎣

Many seem to believe DLP solves everything. Truth is, attackers have gotten much savvier; they're finding clever ways to bypass those controls. Speaking as a pentester, unfortunately, I see this scenario play out constantly. 🙄

So, here's the deal: You've *got* to pay closer attention to browser activity! Make it a point to check those extensions, really drill your employees on spotting phishing attempts, and maybe take another hard look at your DLP strategy. Oh, and let me repeat this loud and clear: Automated scans absolutely DO NOT equal a real penetration test! ☝️

What are your thoughts on this? Running into similar issues or have different experiences? Let me know! 🤔

🚨 Over 6 million Chrome users may have unknowingly installed extensions with hidden tracking code — some with spyware-like behavior.

Researcher John Tuckner from Secure Annex discovered 57 extensions, some of them public, others hidden and only accessible via direct URL. These extensions pose serious security and privacy risks.

Here’s what these extensions can do:
- Access cookies, including sensitive headers like 'Authorization'
- Monitor browsing behavior and collect top-visited sites
- Modify search engines and results
- Inject remote scripts into webpages via iframes
- Execute commands remotely, including opening/closing tabs
- Activate tracking features on demand

Some extensions claim to be security or privacy tools — including names like “Fire Shield Extension Protection,” “Securify,” and “Browser Checkup” — but contain heavily obfuscated code and suspicious external callbacks to domains like "unknow (dot) com".

📛 These extensions are:
- Not searchable on the Chrome Web Store
- Actively pushed via ads and shady websites
- Operating under broad permissions without clear purpose
- Still live in some cases, despite partial takedowns

Here are some of the most-downloaded suspicious extensions:
- Cuponomia – Coupon and Cashback (700,000 users)
- Fire Shield Extension Protection (300,000 users)
- Browser WatchDog for Chrome (200,000 users)
- Securify for Chrome™ (200,000 users)
- Total Safety for Chrome™ (300,000 users)

If you use Chrome:
- Review your installed extensions
- Remove any of the above immediately
- Reset passwords for accounts you’ve accessed recently
- Avoid installing browser tools from unverified sources

🔐 At @Efani we believe privacy tools shouldn’t come with surveillance built in. Always check extension permissions — and if it asks for too much, it’s probably taking more than it gives.

🚨 Think your browser extensions are harmless? Think again.

A new report just exposed a massive blind spot in enterprise security: browser extensions.

We all use them—spell checkers, grammar tools, even GenAI assistants. But according to the Enterprise Browser Extension Security Report 2025 by LayerX, the very tools we rely on every day are exposing sensitive enterprise data.

Here’s what the report found:

- 99% of employees use browser extensions
- 53% of those extensions can access sensitive data like cookies, passwords, and page contents
- 54% of extension publishers are unknown, often identified only by a Gmail address
- Over 20% use GenAI extensions, and 58% of these have high-risk permissions
- 51% of extensions haven’t been updated in a year, making them ripe for exploitation

The risk? A single compromised extension could give attackers a backdoor into your organization.

LayerX recommends five key actions for IT and security leaders:
- Audit every extension in use
- Categorize by usage and risk
- List out permissions granted
- Assess publisher reputation and sideloading risks
- Apply adaptive, risk-based enforcement policies

At @Efani, we advocate for secure-by-default environments—because your data protection shouldn’t rely on chance or outdated extensions.

If you’re not actively managing browser extension risks in your org, now’s the time.

Browser extensions... seriously? 🤯 Think of 'em like little backdoors straight into your systems.

Sure, things like spellcheckers and handy AI tools seem convenient, right? But the permissions they often demand? Honestly, it's often insane. 😵‍💫

Look, as a pentester, I strike gold with these *all the time*! 💰 We're talking cookies, passwords, browsing habits – sometimes it's all just wide open. And *then* people are shocked when they get hacked. 🤷‍♂️

Yeah, security awareness training definitely matters. But here’s what’s even more critical: you absolutely *need* to know which extensions your team is actually using! Go on, check those permissions thoroughly! Otherwise, you're just asking for trouble down the line. 💥

So, spill the beans: Which browser extension has given *you* a major headache before? Let's hear it!

🔒 I Browser più sicuri per la tua privacy: la guida 2025

Hai mai pensato a quanto il tuo browser ti espone online? L'articolo analizza le migliori alternative expert-tested:

✅ Blocco tracker integrato
✅ Ricerche anonime
✅ Protezione fingerprinting

Scopri perché la scelta del browser è la prima trincea della difesa digitale ➡️ [zdnet.com/article/best-browser]

:diggita: @sicurezza@diggita.com


ZDNETThe best secure browsers for privacy in 2025: Expert testedIf you are looking for a secure browser, you must focus on privacy. The best options include ad blockers, private searches, and more.

Supply Chain Attack: Malicious Browser Extensions Target Users via Compromised Developer Accounts

In a sophisticated attack, threat actors exploited compromised developer accounts to distribute malicious browser extensions through the Chrome Web Store. This incident highlights the vulnerabilities ...

news.lavx.hu/article/supply-ch

The Browser as a New Cybersecurity Battleground: Evolving Threats and Defense Strategies

As cybercriminals shift their focus to browser-based attacks, traditional security measures are proving inadequate. This article explores the emerging threats within browsers and the need for innovati...

news.lavx.hu/article/the-brows

Jaja, der Listenheini wieder. Diesmal hat mich mein Research zu sog. "Text Substition Tools" geführt. Sowas wie #ahk teilweise auch als Browser-Extension. Nich ganz unheikel. Deshalb bin ich auch bei sowas wie #ScamAdviser #Virustotal oder #BrowserAudit vorbei gekommen. Schaut mein kleines erstes Forschungsergebnis:

y.lab.nrw/txt-clip (Hedgedoc)

Gerne ergänzen, wie ihr hier gute Lösungen kennt.

\__
#OpenSource #BrowserSecurity #CyberSec #InfoSec