Browser-borne Attacks
2023-05-15As more and more businesses adopt Software-as-a-Service (SaaS) solutions, the security concerns surrounding these applications continue to grow. SaaS solutions are hosted and managed by third-party vendors, which means that businesses must trust their data to these vendors.
A report says, SaaS adopters are indeed exposed to browser-borne attacks. SaaS applications are delivered over the internet, and users access them using a web browser. Since web browsers are frequently targeted by attackers, SaaS applications are also at risk of being compromised through the browser.
As the browser serves as the primary interface between the on-premises environment, the cloud, and the web in the modern enterprise. Therefore, the browser is also exposed to multiple types of cyber threats and operational risks. A report states that, 87% of SaaS Adopters are Exposed to Browser-borne Attacks.
The key reason for the increasing attack are:
· Organizations in the cloud are exposed to web-borne attacks. 87% of all-SaaS adopters and 79% of CISOs in a hybrid environment experienced a web-borne security threat in the past 12 months.
· Account takeover is a top concern. 48% list credential phishing as the riskiest browser threat. Followed by malicious browser extensions (37%), malware download (9%), and browser vulnerabilities (6%).
· Unsanctioned apps and shadow identities are perceived as unaddressed security gaps. 95% of organizations have a coverage level of 50% or less for unsanctioned apps.
· Most organizations employ at least two security measures to combat phishing attacks. 79% employ network security tools, like firewalls and SWGs.
· Both all-SaaS and hybrid organizations use network solutions to block phishing, but realize this is not an efficient strategy. 80% have a coverage level of 50% or less.
Overall, while browser-borne attacks are a concern for SaaS adopters, CISOs are still struggling to solve the security debt created by the transition to the cloud. Resulted, threats like phishing, account takeover and unsanctioned apps are top concerns for CISOs, who are looking for solutions that can mitigate them. It is high time to to take proactive measures to protect against them and help mitigate the risks and keep data and systems secure.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.