DesignRush
  • Trending Brands
  • AGENCY DIRECTORY
    Featured
    Branding & Creative
    Website & Interface
    Marketing
    Software & App
    IT Services
    Featured
    • Web Design Companies
    • Web Design Companies
    • Digital Marketing Agencies
    • Digital Marketing Agencies
    • Software Development Companies
    • Software Development Companies
    • Mobile App Development Companies
    • Mobile App Development Companies
    • Web Development Companies
    • Web Development Companies
    • SEO Agencies
    • SEO Agencies
    • AI Companies
    • AI Companies
    • UI/UX Design Agencies
    • UI/UX Design Agencies
    • PPC Agencies
    • PPC Agencies
    • Branding Agencies
    • Branding Agencies
    • Google Ads Agencies
    • Google Ads Agencies
    Featured
    Branding & Creative
    • Digital Agencies
    • Digital Agencies
    • Branding Agencies
    • Branding Agencies
    • Creative Agencies
    • Creative Agencies
    • Product Design Companies
    • Product Design Companies
    • Logo Design Companies
    • Logo Design Companies
    • Graphic Design Companies
    • Graphic Design Companies
    • Packaging Design Companies
    • Packaging Design Companies
    • Video Production Companies
    • Video Production Companies
    • Public Relations Firms
    • Public Relations Firms
    • Design Agencies
    • Design Agencies
    • Reputation Management Companies
    • Reputation Management Companies
    Branding & Creative
    Website & Interface
    • Web Design Companies
    • Web Design Companies
    • eCommerce Development Companies
    • eCommerce Development Companies
    • Web Development Companies
    • Web Development Companies
    • WordPress Web Design Companies
    • WordPress Web Design Companies
    • WordPress Development Companies
    • WordPress Development Companies
    • Magento Development Companies
    • Magento Development Companies
    • Shopify Development Companies
    • Shopify Development Companies
    • UI/UX Design Agencies
    • UI/UX Design Agencies
    • Small Business Website Design Companies
    • Small Business Website Design Companies
    Website & Interface
    Marketing
    • Digital Marketing Agencies
    • Digital Marketing Agencies
    • SEO Agencies
    • SEO Agencies
    • PPC Agencies
    • PPC Agencies
    • Social Media Marketing Companies
    • Social Media Marketing Companies
    • Search Engine Marketing Agencies
    • Search Engine Marketing Agencies
    • Email Marketing Agencies
    • Email Marketing Agencies
    • Small Business SEO Companies
    • Small Business SEO Companies
    • Local SEO Companies
    • Local SEO Companies
    • Google Ads Agencies
    • Google Ads Agencies
    • Advertising Agencies
    • Advertising Agencies
    • eCommerce SEO Agencies
    • eCommerce SEO Agencies
    • Media Buying Agencies
    • Media Buying Agencies
    • Content Marketing Agencies
    • Content Marketing Agencies
    • Lead Generation Companies
    • Lead Generation Companies
    • Video Marketing Services
    • Video Marketing Services
    Marketing
    Software & App
    • Software Development Companies
    • Software Development Companies
    • Offshore Software Development Companies
    • Offshore Software Development Companies
    • Outsourcing Software Development Companies
    • Outsourcing Software Development Companies
    • Mobile App Development Companies
    • Mobile App Development Companies
    • VR & Augmented Reality Companies
    • VR & Augmented Reality Companies
    • AI Companies
    • AI Companies
    • Android App Development Companies
    • Android App Development Companies
    • iPhone App Development Companies
    • iPhone App Development Companies
    • Blockchain Development Companies
    • Blockchain Development Companies
    • Software Testing Companies
    • Software Testing Companies
    Software & App
    IT Services
    • IT Services Companies
    • IT Services Companies
    • IT Outsourcing Companies
    • IT Outsourcing Companies
    • Managed Service Providers
    • Managed Service Providers
    • Cybersecurity Companies
    • Cybersecurity Companies
    • Big Data Analytics Companies
    • Big Data Analytics Companies
    • Cloud Consulting Companies
    • Cloud Consulting Companies
    • Staff Augmentation Services
    • Staff Augmentation Services
    • SharePoint Consultants
    • SharePoint Consultants
    IT Services
  • List Your AgencyFind An Agency
  • Marketplace
  • Awards
    • All the Latest Winners
    • Website Design
    • Logo Design
    • Print Design
    • App Design
    • Packaging Design
    • Video Design
List Your AgencyFind An Agency
Trending Brands
  • Latest News
  • Interviews
  • Podcast
  • Trends
  • Trending Brands
  • Cybersecurity Expert Warns: Browsers Are ‘Trusted More Than They Should Be’
5 min read

Cybersecurity Expert Warns: Browsers Are ‘Trusted More Than They Should Be’

Why trusting your browser may be the weakest link in your security stack, and what to do about it now.
Cybersecurity
1,124
Share
Receive our Newsletter
Join over 70,000 B2B decision-makers growing their brands
Receive proposals from qualified agencies
Submit your project
Cybersecurity Expert Warns: Browsers Are ‘Trusted More Than They Should Be’
Article by Andrea SurnitAndrea Surnit
Published Jan 14 2026
|
Updated Jan 14 2026

Browser Security Risks and Overtrust: Key Findings

Over 85% of daily work happens in browsers, yet most companies still rely on security tools that can’t detect in-browser threats.
97% of some browser extension code can be malicious, demonstrating why brands must audit installed tools, not just endpoints.
AI plugins now access emails, files, and workflows, showing how agencies must vet vendors and enforce permission guardrails from day one.

Over 85 % of daily work is conducted through web browsers, according to the State of Workforce Security.

This makes browser security a critical enterprise concern.

Yet, most companies still rely on endpoint tools that can’t see what happens there.

That blind spot is costing organizations more than they realize.

“Most data breaches today don't happen because systems are hacked,” says Nishant Sharma, Head of Cybersecurity Research at SquareX.

“They happen because browsers are trusted more than they should be.”

In Episode No. 122 of the DesignRush Podcast, Sharma explains how invisible browser-level decisions are reshaping organizational trust, user safety, and competitive readiness.

Sharma draws on research into browser architecture, extensions, and embedded AI tools.

He highlights a growing gap in how organizations approach modern threats, especially those hiding in the tools workers use every day, and also shares:

  • Why browser-based work has become the most overlooked attack surface
  • How everyday tools like extensions and AI introduce invisible risks
  • Why legacy security tools miss threats rooted in architecture and behavior

Episode Chapter Summary

For a quick overview of the full episode, here are key moments from the conversation:

  • 01:18 – Why most breaches begin with browser trust, not hacking
  • 06:03 – How architectural flaws differ from code bugs in browser design
  • 09:20 – How extensions quietly hijack user data and permissions
  • 13:46 – Why traditional security tools miss browser-native threats
  • 25:35 – OAuth abuse explained: persistent permissions and long-term access risks

If you're unsure where your organization's real cyber risk lives, this episode brings much-needed clarity.

Listen to the full episode now on Spotify or watch on YouTube to protect your business from the threats you can’t see.

1. Mistake: Trusting Extensions Just Because They’re in the Chrome Store

Browser extensions are among the most commonly installed tools in the workplace, often without any security oversight.

Users install them to speed up workflows, customize websites, or automate simple tasks.

But under the hood, many extensions do far more than advertised.

“Ninety to ninety-eight percent of people don’t understand the power of extensions and the kind of damage that they can do,” Sharma says.

“Three percent of the code will be doing the functionality that it advertises, but then 97% of the code is actually taking away all of your history.”

The most dangerous part is how these extensions don’t need to be malicious at the start.

Attackers often buy legitimate, popular extensions and quietly push malicious updates.

And so, what may have started as a helpful tool can quickly turn into a surveillance platform without the user ever realizing it.

That’s why it’s critical to vet extensions like you would any software vendor, limit what gets installed, and monitor for changes in ownership or behavior over time.

2. Oversight Gap: OAuth Access That Never Expires

Many teams use Google logins for convenience. But few understand the long-term risk of OAuth access.

Once a user grants access to a third-party app, that permission often persists forever unless manually revoked.

“People just click 'Allow,' trusting Google,” Sharma explains.

“It'll remain there till the time you revoke it. And most people don't know it... revoking it is actually out of the question.”

This creates a silent attack vector where malicious actors can harvest email, calendar, and file access long after a user has forgotten the interaction.

Attackers can take advantage of those lingering permissions to access or reset user accounts.

That’s why it’s important to regularly revoke access to unused apps and make sure users understand what they’re consenting to when approving OAuth scopes.

3. Blind Spot: Traditional Security Tools Can’t See Browser Threats

Most enterprise security stacks are built around endpoints, networks, and devices.

But modern attacks increasingly live entirely within the browser, never touching the file system or triggering antivirus alerts.

“They'll never touch your machine, your hard disk,” Sharma explains.

“The conventional way of protecting them (your antiviruses and your endpoint detection and response systems) they are not able to look into it.”

Encrypted payloads and in-browser execution mean attackers can bypass traditional defenses without detection.

The risk? Invisible attacks bypass traditional defenses.

To prevent this, implement browser-level visibility and defense systems.

4. Risk Amplifier: AI Tools That Shortcut Trust

The rise of AI-powered agents has created a new category of exposure.

Users upload sensitive documents or grant browser control to extensions without realizing how much access they’ve handed over.

“You go there and you're uploading the file and you're downloading the file then... you’re going to double click on the file that is downloaded," Sharma says.

Sharma points to tools that mimic automation agents, where AI plugins can control browser behavior, access inboxes, or summarize files—often with minimal user oversight.

What's at stake? Productivity-enhancing tools become gateways for data loss.

So, be sure to prioritize verified vendors. Add AI policy guardrails. Keep humans in the loop for sensitive actions.

This concern is already playing out across the industry, as browser vendors and AI leaders race to redefine how autonomous agents interact with everyday workflows:

5. Behavior Shift: Security Starts With Awareness, Not Just Tools

Technology alone can’t solve what behavior keeps breaking. Many breaches start not with a vulnerability, but with a click.

“There are certain things that are easy to do just by changing your behaviors, just by changing your habits,” Sharma says.

From clicking on malicious ads to using free online converters, users often bypass security policies for speed or convenience.

“It will open as a PDF, but then it is also doing something else,” he adds.

The worrying outcome? Familiar workflows masking serious threats.

To keep protected, normalize digital hygiene. Train teams to pause, question, and verify.

designrush

About the Guest

Nishant Sharma
Head of Cybersecurity Research, SquareX

Sharma leads browser-focused cybersecurity research at SquareX, uncovering how real-world behavior and architectural flaws drive modern threats. His work helps enterprises shift from reactive defense to proactive trust-building across browser and AI environments.

Why Browser-Native Awareness Must Catch Up Now

Browser risk is no longer niche.

As AI accelerates and web apps become the workplace, organizations must treat browser security as core infrastructure.

“Just like any great technical advancement, it also has a yin and yang," says Sharma.

It is completely dependent on what part you're using it and which part eventually wins.”

Those who act early move faster, build trust, and unlock AI’s potential safely.

Watch the full conversation on YouTube or listen on Spotify.

Check out DesignRush’s Top Cybersecurity Firms to find expert partners.

👍👎💗🤯
Tags:
designrush podcast 
Andrea Surnit
Andrea Surnit
B2B Reporter
Andrea ‘Andi’ Surnit is a writer with over eight years in journalism and marketing. She started her career as a junior news reporter before transitioning to digital marketing at Razza Consulting Group, where she advanced to the role of Lead Writer. Throughout her career, she has cultivated expertise in ad copy, web content, client servicing, social media, and SEO. Currently, Andi writes for Spotlight at DesignRush, covering the latest trends in brand campaigns and agency news.
Follow on: LinkedIn Send email: andrea.l@designrush.com

Latest Cybersecurity News

view all
Gen AI growth graph
Cybersecurity
AI App Data Leak Signals Urgent Need for AI-Aware Development Standards
By Ryan de Smidt  |  4 weeks ago  |  4 min read
Image of Pete Cannata
Cybersecurity
After 35M Patient Records Breached in 2025, Here Are 10 Questions for CIOs
By Ryan de Smidt  |  1 month ago  |  6 min read
Attila Forczek, global CTO & director at Mega
Cybersecurity
3 Key Strategies Behind MEGA’s Secure File Sharing and Collaboration Platform
By Andrea Surnit  |  2 months ago  |  4 min read
Cybersecurity
Fraud Surges 60% Across Fintech, Forcing Startups to Put Security Before Speed
By Roberto Orosa  |  3 months ago  |  3 min read
view all

Most Popular Cybersecurity Stories

Gen AI growth graph
Cybersecurity
AI App Data Leak Signals Urgent Need for AI-Aware Development Standards
By Ryan de Smidt  |  4 weeks ago  |  4 min read
Voice AI market growth graphs
Artificial Intelligence
Voice AI Agents Are Replacing Contact Centers in 2026: Here’s What That Means for CX Leaders
By Ryan de Smidt  |  1 week ago  |  5 min read
Artificial Intelligence
Gartner Warns: 40% of Agentic AI Projects to Fail by 2027 and Here's Why
By Enrique Jose Tabuena  |  1 month ago  |  5 min read
A drive thru employee at Burger King wearing a headset talking to AI assistant "Patty"
Artificial Intelligence
Burger King's AI Assistant 'Patty' Coaches Drive-Thru Friendliness in 500 Stores
By Katherine Maclang  |  1 month ago  |  3 min read
DesignRush

DesignRush is the premier agency directory, awards platform, and media hub connecting brands with top agencies in software, app development, design, and marketing. We deliver vetted reviews, insights, and trends to drive business growth.

For Businesses

  • Agency Categories
  • Agency Ranking Methodology
  • Trending Brands
  • FAQs

For Agencies

  • Benefits Of Listing With Us
  • Submit An Agency
  • Sponsorship
  • All Agencies

About DesignRush

  • Team & Story
  • Contact Us
18117 Biscayne Blvd
Miami, FL 33160
United States
© DesignRush 2026, All Rights Reserved
  • Sitemap
  • Terms of Use & IP
  • Privacy Policy
  • Accessibility
  • Fraud Protection
s