Push Security Adds Malicious Browser Extension Detection to Block Threats in Employee Browsers

The threat landscape for cybersecurity is constantly evolving, with new vulnerabilities and attacks emerging every day. One area that has gained significant attention in recent times is the use of malicious browser extensions as a means of compromise. With the rise of these threats, organizations are looking for ways to protect their employees' browsers from potential security risks.

Push Security has announced a new feature that enables organizations to automatically block known-bad extensions from running in employee browsers. This feature is part of the company's browser-based security platform, which aims to provide real-time visibility and enforcement without disrupting productivity.

The Growing Risk of Malicious Browser Extensions

Attackers are increasingly turning to malicious browser extensions as a preferred method of compromise. Recent campaigns such as ShadyPanda, ZoomStealer, and GhostPoster highlight the growing risk posed by compromised extensions. These attacks often begin with seemingly benign extensions that later turn malicious. Attackers may create initially good extensions and then push malicious updates, or take over existing extensions with large install bases by hacking extension developers or purchasing them legitimately.

This poses a significant challenge for organizations, as it is difficult to keep track of the many extensions available in the market. The Chrome Web Store alone hosts over 100,000 extensions, making this an expanding attack surface that many organizations do not fully understand.

Push Security's New Capability

Push Security's new capability enables organizations to automatically block known malicious extensions from running in employee browsers. This is derived from the company's continuously updated intelligence database of reported malicious extensions. Customers can enforce policies in monitor or block mode via the Push admin console.

When a malicious extension is detected, the platform generates severity-based alerts and can automatically disable the extension in affected browsers. Beyond blocking known-bad extensions, Push provides real-time visibility into all extensions running across an organization's workforce, including metadata such as publisher history, permissions, deployment method, and update activity.

This enables security teams to seamlessly manage extensions across browsers and operating systems from a single platform, identify risky extensions, implement allowlists or blocklists, and monitor for suspicious changes such as changes in ownership or permissions.

Expanding Push's Browser-Based Security Platform

The new feature expands Push's browser-based security platform, which also protects against adversary-in-the-middle (AiTM) phishing, credential stuffing, session hijacking, and other browser-native attack techniques. This comprehensive approach to cybersecurity provides organizations with a robust defense against various threats.

Conclusion:

Push Security's new malicious browser extension detection capability is an essential addition to any organization's security arsenal. By enabling automatic blocking of known-bad extensions and providing real-time visibility into all extensions running across the workforce, this feature helps organizations stay ahead of emerging threats. As the threat landscape continues to evolve, it's crucial for security teams to have access to robust tools like Push Security's browser-based security platform.

Keyword-rich Meta Description:

"Push Security adds malicious browser extension detection to block threats in employee browsers. Learn how this feature helps organizations protect against emerging threats and stay ahead of malicious extensions."

Keyword-rich Head Tags:

< meta name="keywords" content="malicious browser extensions, Push Security, browser-based security platform, cybersecurity, threat landscape, employee browsers">

< title>Push Security Adds Malicious Browser Extension Detection to Block Threats in Employee Browsers

Note: The above code uses relevant keywords naturally throughout the article and also includes a meta description that highlights the key benefit of the feature.