SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are

SquareX’s research reveals that Browser AI Agents are more likely tofall prey to cyberattacks than employees, making them the new weakest link that enterprisesecurity teams need to look out for. Moreimportantly, employees using Browser AI Agents are unlikely to have enough security expertiseto be able to write such a prompt in the first place. Thus, it is critical for enterprises working with Browser AIAgents to provide browser-native guardrails that will prevent agents and employees alike fromfalling prey to these attacks. Until the daybrowsers develop native guardrails for Browser AI Agents, enterprises must incorporatebrowser-native solutions like Browser Detection and Response to prevent these agents frombeing tricked into performing malicious tasks. Unlike human employees, Browser AI Agents are notsubject to regular security awareness training. Indeed, a survey from PWC found that 79% of organizationshave already adopted browser agents today.Yet, Browser AI Agents expose organizations to a massive security risk. By delivering unparalleledvisibility and control directly within the browser, SquareX enables security leaders to reducetheir attack surface, gain actionable intelligence, and strengthen their enterprise cybersecurityposture against the newest threat vector – the browser. Consequently, Browser AI Agents are more likely to fall prey tobrowser-based attacks than even a regular employee. The productivity gains that Browser AI Agents provide make them an extremely compelling tool foremployees and organizations alike. Vivek Ramachandran, Founder & CEO of SquareX, warns, “The arrival of Browser AI Agentshave dethroned employees as the weakest link within organizations. Critically, these Browser AI Agents are running onbehalf of the user, with the same privilege level to access enterprise resources. Browser AI Agents are software applications that act on behalf of users to access and interactwith web content. With the popular open-source Browser Use framework used by thousands of organizations,SquareX demonstrated how the Browser AI Agent, instructed to find and register for afile-sharing tool, succumbed to an OAuth attack. SquareX’s industry-first Browser Detection and Response (BDR) solution empowersorganizations to proactively detect, mitigate, and threat-hunt client-side web attacks, includingmalicious browser extensions, advanced spearphishing, browser-native ransomware, genAIDLP, and more. Even if it is possible for users to addthese guardrails, the overhead required to extensively write the security risk of every task performed by the agent in every prompt would probably outweigh the productivity gains. In the process of completing its task, it granteda malicious app complete access to the user’s email despite multiple suspicious signals -irrelevant permissions, unfamiliar brands, suspicious URLs – that likely would have stoppedmost employees from granting these permissions. Eventually, the new generation of identity andaccess management tools will also have to take into account Browser AI Agent identities toimplement granular access controls on agentic workflows. Users can instruct these agents to automate browser-based tasks such asflight bookings, scheduling meetings, sending emails, and even simple research tasks. In other scenarios, these agents mightexpose the user’s credit card information to a phishing site while trying to purchase groceries ordisclose sensitive data when responding to emails from an impersonation attack. Unfortunately, neither browsers nor traditional security tools can differentiate between actionsperformed by users and these agents. These agents aretrained to complete the tasks they are instructed to do, with little to no understanding of the security implications of their actions. Unlike legacy security approaches and cumbersome enterprise browsers,SquareX seamlessly integrates with users’ existing consumer browsers, ensuring enhancedsecurity without compromising user experience or productivity.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 30 Jun 2025 13:35:13 +0000


Cyber News related to SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are

SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are - SquareX’s research reveals that Browser AI Agents are more likely tofall prey to cyberattacks than employees, making them the new weakest link that enterprisesecurity teams need to look out for. Moreimportantly, employees using Browser AI Agents ...
7 hours ago Cybersecuritynews.com
SquareX to Uncover Data Splicing Attacks at BSides San Francisco, A Major DLP Flaw that Compromises Data Security of Millions - Titled “Data Splicing Attacks: Breaking Enterprise DLP from the Inside Out”, the talk will demonstrate multiple data splicing techniques that will allow attackers to exfiltrate any sensitive file or clipboard data, completely bypassing major Data ...
2 months ago Cybersecuritynews.com
SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk - As browsers become the new endpoint, it is crucial for enterprises to reconsider their browser security strategy – just as EDRs were critical to defend against file-based ransomware, a browser-native solution with a deep understanding of ...
3 months ago Cybersecuritynews.com
SquareX Unveils Polymorphic Extensions that Morph Infostealers into Any Browser Extension - Password Managers, Wallets at Risk - In addition to the polymorphic attack, SquareX was also the first to discover and disclose multiple extension-based attacks, including Browser Syncjacking, the Chrome Store consent phishing attack leading to Cyberhaven’s breach and numerous other ...
3 months ago Cybersecuritynews.com
The Human Firewall: Strengthening the Weakest Link in Cybersecurity - With new technology and changed business operations comes exposure to new cyber risks, prompting companies to prioritize and invest in stronger cybersecurity measures. A joint study by Stanford University Professor Jeff Hancock and security firm ...
1 year ago Cyberdefensemagazine.com
Malicious Chrome extensions can spoof password managers in new attack - In SquareX's demonstration, the attackers impersonate the 1Password password manager extension by first disabling the legitimate one using the 'chrome.management' API, or if the permissions aren't available, user interface manipulation tactics to ...
3 months ago Bleepingcomputer.com
Google Unveils A2A Protocol That Enable AI Agents Collaborate to Automate Workflows - The protocol is built on five key design principles: embracing agentic capabilities that allow agents to collaborate in unstructured modalities, building on existing standards like HTTP and JSON-RPC, ensuring security by default with enterprise-grade ...
2 months ago Cybersecuritynews.com
15% of office workers use unsanctioned GenAI tools - Help Net Security - Rigid security protocols — such as complex authentication processes and highly restrictive access controls — can frustrate employees, slow productivity and lead to unsafe workarounds, according to Ivanti. When employees have unfettered access to ...
8 months ago Helpnetsecurity.com
Millions of Enterprises at Risk: SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions - Cybersecurity Insiders - This has made browser extensions a very effective and potent technique to silently be installed and monitor enterprise users, and attackers are leveraging them to monitor communication over web calls, act on the victim’s behalf to give permissions ...
8 months ago Cybersecurity-insiders.com
Millions of Enterprises at Risk: SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions - Cybersecurity Insiders - This has made browser extensions a very effective and potent technique to silently be installed and monitor enterprise users, and attackers are leveraging them to monitor communication over web calls, act on the victim’s behalf to give permissions ...
8 months ago Cybersecurity-insiders.com
Millions of Enterprises at Risk: SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions - Cybersecurity Insiders - This has made browser extensions a very effective and potent technique to silently be installed and monitor enterprise users, and attackers are leveraging them to monitor communication over web calls, act on the victim’s behalf to give permissions ...
8 months ago Cybersecurity-insiders.com
Millions of Enterprises at Risk: SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions - Cybersecurity Insiders - This has made browser extensions a very effective and potent technique to silently be installed and monitor enterprise users, and attackers are leveraging them to monitor communication over web calls, act on the victim’s behalf to give permissions ...
8 months ago Cybersecurity-insiders.com
Definition from TechTarget - BYOD is a policy that enables employees in an organization to use their personally owned devices for work-related activities. Smartphones are the most common mobile device an employee might take to work, but they also take their own tablets, laptops ...
1 year ago Techtarget.com
LinkedIn Tests Generative AI to Field Cybersecurity Questions From Employees and Suppliers - LinkedIn is testing how generative artificial intelligence could help employees and external suppliers get answers about cybersecurity policies within seconds, potentially cutting wait times for business deals or decisions to implement new tools. ...
1 year ago Wsj.com
The Browser Blind Spot: Why Your Browser is the Next Cybersecurity Battleground - Security teams must integrate browser detection & response capabilities into their enterprise security stack to gain real-time visibility, detect browser-native threats, and protect people where they work. Just as EDR transformed endpoint ...
4 months ago Bleepingcomputer.com
Epik, the Far-Right's Favorite Web Host, Has a Shadowy New Owner - A technology company that has been essential in keeping far-right and extremist websites online was acquired last year by a firm that operates an empire of shell companies across the United States, according to people familiar with the deal. Epik.com ...
1 year ago Wired.com
Microsoft Unveils New Security Copilot Agents & Protections for AI - The Alert Triage Agents in Microsoft Purview prioritize data loss prevention and insider risk incidents, while the Conditional Access Optimization Agent in Microsoft Entra identifies security gaps in identity protection policies. Additional Microsoft ...
3 months ago Cybersecuritynews.com
AI models can be weaponized to hack websites on their own The Register - AI models, the subject of ongoing safety concerns about harmful and biased output, pose a risk beyond content emission. When wedded with tools that enable automated interaction with other systems, they can act on their own as malicious agents. ...
1 year ago Go.theregister.com
How Human Elements Impact Email Security - Human factors heavily influence email security, with individuals' vulnerability to phishing and social engineering playing a crucial role in compromising email systems. From an employee clicking on a spam link to accidentally giving out their ...
1 year ago Hackread.com
Addressing Bias in Insider Risk Monitoring - Enterprises often take similar steps to protect data from internal and outside threats, where teams analyze activities to identify potential risks. Security operations centers defending against these threats must look at employees, partners, and ...
1 year ago Cyberdefensemagazine.com
Addressing Bias in Insider Risk Monitoring - Enterprises often take similar steps to protect data from internal and outside threats, where teams analyze activities to identify potential risks. Security operations centers defending against these threats must look at employees, partners, and ...
1 year ago Cyberdefensemagazine.com
Five AI topics to discuss with your CEO - At Cisco Live EMEA in Amsterdam in early February, you couldn't swing an Ethernet cable without hitting someone who was talking about it. Even though AI comes with especially useful applications and some very practical downsides, it's important to ...
1 year ago Feedpress.me
The Future of Phishing Email Training for Employees in Cybersecurity - One common method they use is through phishing emails. To counter this changing threat, companies must give importance to providing phishing email training for employees on identifying and responding properly to phishing attempts. Standard training ...
1 year ago Hackread.com
Understanding Each Link of the Cyberattack Impact Chain - It's often difficult to fully appreciate the impact of a successful cyberattack. Other consequences aren't so obvious - from a loss of customer trust and potential business to stolen data that may surface as part of another cyberattack years later. ...
1 year ago Securityboulevard.com
Review: Top 5 For Outsourced Customer Service Solutions UK and Abroad - For companies that have too many phone calls and emails to keep up, it is very common to outsource your customer services, either domestically in the UK or abroad to the likes of India or The Philippines. An outsourced customer service firm can ...
1 year ago Itsecurityguru.org

Latest Cyber News


Cyber Trends (last 7 days)