Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • The Hacker News
  • Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds
  • The Hacker News

Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds

[email protected] The Hacker News Published: April 15, 2025 | Updated: April 15, 2025 3 min read
0 views

Apr 15, 2025The Hacker NewsData Privacy / Enterprise Security

Browser Extensions Can Access Sensitive Enterprise Data

Everybody knows browser extensions are embedded into nearly every user’s daily workflow, from spell checkers to GenAI tools. What most IT and security people don’t know is that browser extensions’ excessive permissions are a growing risk to organizations.

LayerX today announced the release of the Enterprise Browser Extension Security Report 2025, This report is the first and only report to merge public extension marketplace statistics with real-world enterprise usage telemetry. By doing so, it sheds light on one of the most underestimated threat surfaces in modern cybersecurity: browser extensions.

The report reveals several findings that IT and security leaders will find interesting, as they build their plans for H2 2025. This includes information and analysis on how many extensions have risky permissions, which kinds of permissions are given, if extension developers are to be trusted, and more. Below, we bring key statistics from the report.

Highlights from the Enterprise Browser Extension Security Report 2025

1. Browser extensions are ubiquitous in enterprise environments. 99%, nearly all, of employees, have browser extensions installed. 52% have more than 10 extensions installed.

Security analysis: Nearly all employees are exposed to browser extension risk.

2. Most extensions can access critical data. 53% of enterprise users’ extensions can access sensitive data like cookies, passwords, web page contents, browsing information, and more.

Security analysis: An employee-level compromise could jeopardize the entire organization.

3. Who publishes these extensions? Who knows? More than half (54%) of extension publishers are unknown and only identified via Gmail. 79% of publishers only published one extension.

Security analysis: Tracking the reputability of extensions is difficult, if possible at all with IT resources.

4. GenAI extensions are a growing threat. Over 20% of users have at least one GenAI extension, and 58% of these have high-risk permission scopes.

Security analysis: Enterprises should define clear policies for GenAI extension use and data sharing.

5. Unmaintained and unknown browser extensions are a growing concern. 51% of extensions haven’t been updated in over a year, and 26% of enterprise extensions are sideloaded, bypassing even basic store vetting.

Security analysis: Extensions can be vulnerable even if they’re not purposefully malicious.

5 Recommendations for Security and IT

The report not only brings data, it also provides actionable guidance for security and IT teams, recommending how to deal with the browser extension threat.

Here’s what LayerX advises organizations:

  • Audit all extensions – A full picture of extensions is the foundation for understanding the threat surface. Therefore, the first step in securing against malicious browser extensions is to audit all extensions in use by employees.
  • Categorize extensions – Certain types of extensions that make them appealing to attack. This can be due to their broad user base (such as GenAI extensions) or because of the permissions granted to such extensions. Categorizing extensions can help assess the browser extension security posture.
  • Enumerate extension permissions – The next step is to list the information extensions can access. This helps further map the attack surface and configure policies later on.
  • Assess extension risk – Now it’s time for risk management. This means assessing the risk for each extension based on their permissions and the information they can access. In addition, a holistic risk assessment includes external parameters such as reputation, popularity, publisher, and installation method. Together, these parameters should be combined into a unified risk score.
  • Apply adaptive, risk-based enforcement – Finally, organizations can use their analysis to apply adaptive, risk-based enforcement policies tailored to their uses, needs, and risk profile.

Access the Report

Browser extensions are not just a productivity tool, they’re an attack vector most organizations do not know exists. LayerX’s 2025 report provides comprehensive findings and data-driven analysis to help CISOs and security teams rein in this risk and build defensible browser environments.

Download the full report.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

About The Author

[email protected] The Hacker News

See author's posts

Original post here

What do you feel about this?

  • The Hacker News

Post navigation

Previous: China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games
Next: Malicious PyPI Package Targets MEXC Trading API to Steal Credentials and Redirect Orders

Author's Other Posts

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1

Related Stories

whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
hacked.jpg
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

[email protected] The Hacker News December 2, 2025 0 0
npm-mal.jpg
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

[email protected] The Hacker News December 2, 2025 0 1
iran-hacking.jpg
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

[email protected] The Hacker News December 2, 2025 0 0
SecAlerts.jpg
  • The Hacker News

SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities

[email protected] The Hacker News December 2, 2025 0 0

Trending Now

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg 5
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg 6
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks iran-hacking.jpg 7
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 2, 2025 0 0

You may have missed

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

Sean December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Sean December 4, 2025 0 0
whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
Copyright © 2026 All rights reserved. | MoreNews by AF themes.