The browser — the everyday tool you use to browse the internet, check your email, and access business apps — has become the primary vulnerability point for companies. According to the Browser Security Report 2025, most risks related to identity, artificial intelligence, and SaaS applications are now concentrated exactly there: in the user’s browser.
Even more concerning: traditional controls like DLP, EDR, or SSE are no longer enough. These operate at lower layers and leave security teams blind to what really happens inside browser sessions.
The report paints a worrisome picture for any IT or security leader. There's now an uncontrolled attack surface made up of unmanaged browser extensions, generative AI tools used via personal accounts, and sessions that bypass corporate SSO.
What was once just a productivity tool is now a digital backdoor — leaking sensitive data or allowing actions outside corporate oversight.
Learn more: 6 Browser-Based Attacks You Must Know and Stop Today
The rise of generative AI in the workplace has created a massive governance gap. Nearly half of employees use AI tools — mostly through personal accounts and without IT oversight.
Key findings from the report:
Traditional protection systems were not built for this. Data no longer leaks through attachments or phishing — it gets pasted into AI prompts.
% of users that paste data to enterprise applications (Source: The Hacker News)
Emerging threats include “smart browsers” like Atlas, Arc Search, or Perplexity Browser. These tools integrate advanced language models directly into the browser, enabling them to read, summarize, and analyze any open page or tab.
For users, this is convenient and efficient. But for companies, it’s a new attack surface with zero control or visibility.
These browsers operate as permanent copilots, capable of seeing and processing everything the user sees — financial data, internal emails, sensitive docs, corporate chats. Worse yet, they often lack clear policies on what gets shared with the cloud or third parties.
Top risks include:
Such tools bypass traditional DLP or SSE defenses, allowing fileless, invisible data exfiltration.
How AI browsers leak enterprise data (Source: The Hacker News)
99% of employees have at least one extension installed, and over half grant them critical access permissions. Many come from unverified sources, forming an unmonitored supply chain with direct access to user data.
The report shows:
Each one is a potential entry point for attacks, cookie theft, session hijacking, or data exposure.
Enterprise users by number of extensions installed (Source: The Hacker News)
Another key insight: identity governance stops at the IdP, but risks begin inside the browser.
More than two-thirds of corporate logins happen outside SSO, and nearly half use personal credentials, making it hard to track who accesses what — and from where.
Key stats:
Attacks like Scattered Spider prove it: hackers don’t need passwords anymore — they want your session tokens, and browsers are where those live.
Corporate vs. Non-corporate access across website categories (Source: The Hacker News)
Today’s work happens mostly in the browser — from SaaS apps to chat platforms. But user behaviors like copy/paste or file uploads are now invisible exfiltration channels.
The report shows:
No phishing needed. No malware. Just a live browser session.
EDR, DLP, and SSE were built to protect files, processes, or network traffic — but they can’t see inside browser sessions.
That means security teams are blind to:
Modern threats live inside the browser — traditional tools were left outside.
Similar titles: Top 10 Browsers for Accessing the Dark Web with Anonymity
To regain control, organizations need security integrated at the browser level, able to monitor real-time sessions without degrading UX.
This includes:
Modern browser security platforms provide visibility and control without forcing users to switch browsers — enabling both productivity and protection.
The report is clear: the browser is now the new perimeter of enterprise security. This is where identity, AI, SaaS, and user behavior intersect. Ignoring this control point is leaving the door wide open to data leaks, identity theft, and corporate espionage.
At TecnetOne, we help organizations secure this new risk surface with advanced visibility and session-level controls. Protect your users — where they work the most: in the browser.