{"id":13621,"date":"2026-04-10T13:13:23","date_gmt":"2026-04-10T13:13:23","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=13621"},"modified":"2026-04-10T13:13:23","modified_gmt":"2026-04-10T13:13:23","slug":"browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-speaking-about","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=13621","title":{"rendered":"Browser Extensions Are the New AI Consumption Channel That No One Is Speaking About"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhj9DUEjhk2fpOJYkJSEMuXQKjwHL1MhXzLniQFjNXvUV_iJEcMwk4MacWDYrrCg096uqXg7pJVZYgagJF58e28tr2lOkZsGqpXbnKfnDVStpGIz2fBGvXayNRfbWWaJ2QueaZoYp72PNJHF6g0W4FPBhbw75r_Dm2cuRr1zCmHFHges6gPQ55gr3hI17TM\/s1600\/layerx.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" alt=\"\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhj9DUEjhk2fpOJYkJSEMuXQKjwHL1MhXzLniQFjNXvUV_iJEcMwk4MacWDYrrCg096uqXg7pJVZYgagJF58e28tr2lOkZsGqpXbnKfnDVStpGIz2fBGvXayNRfbWWaJ2QueaZoYp72PNJHF6g0W4FPBhbw75r_Dm2cuRr1zCmHFHges6gPQ55gr3hI17TM\/s1600\/layerx.jpg\"\/><\/a><\/div>\n<p>Whereas\u00a0a lot of the dialogue on AI safety facilities round defending\u00a0\u2018shadow\u2019 AI and GenAI consumption, there is a wide-open\u00a0window no one&#8217;s guarding: AI browser extensions.\u00a0<\/p>\n<p>A\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/go.layerxsecurity.com\/browser-extension-security-report-2026?utm_source=thn&amp;utm_campaign=besr10042026\">new report from LayerX\u00a0exposes<\/a> simply how deep this blind spot goes, and why AI extensions stands out as the most harmful AI risk floor in your community\u00a0that is not\u00a0on anybody&#8217;s\u00a0radar.<\/p>\n<p>AI\u00a0browser extensions do not set off your DLP\u00a0and do not present up in your SaaS logs. They\u00a0reside contained in the browser itself, with direct entry to every thing your workers see, sort, and keep logged\u00a0into. AI\u00a0extensions are 60% extra prone to have a vulnerability than extensions on\u00a0common, are 3 occasions extra prone to have entry to cookies, 2.5\u00a0occasions extra\u00a0prone to be\u00a0in a position to execute distant scripts within the browser, and 6 occasions extra prone to have elevated their permissions prior to now\u00a0yr. These\u00a0extensions set up in seconds and might stay in your surroundings indefinitely.\u00a0<\/p>\n<h2>The Browser Extension Risk Floor Is Everyone, But No one Is\u00a0Watching<\/h2>\n<p>The\u00a0first false impression is that extensions are a distinct segment threat. One thing restricted to a subset of customers or edge instances. That\u00a0assumption is totally\u00a0unsuitable.<\/p>\n<p>In accordance with the report, 99% of enterprise\u00a0customers run not less than one browser extension, and greater than 1 \/ 4\u00a0have over 10 put in. This\u00a0just isn&#8217;t a protracted tail drawback; it&#8217;s common.<\/p>\n<p>But\u00a0most organizations can not reply primary questions. Which\u00a0extensions are in use? Who put in them? What permissions have they got? What knowledge can they\u00a0entry?<\/p>\n<p>Safety groups have spent years constructing visibility into networks, endpoints, and identities. Sarcastically, browser extensions stay a serious blind\u00a0spot.\u00a0<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEihRvCpOjzZMIKuZ4oOMWF37iPEP-Ch-azY6fkOSutlBWNCabMQly3OUxPX0U5cnewRC3BgHXasyC-r3HAKuAqDdePbMZcSvEll0Ymw7HxBUuTgxo0iKoAuh778fEcmsHUMxMLJmTOFs5hTPDLB_2I8EM_WuEyov97WUdCBO-MPxOoVgBNc2OAX7eni0SQ\/s1600\/Extensions-Installed-1.png\" style=\"clear: left; display: block; float: left; padding: 1em 0px; text-align: center;\"><img decoding=\"async\" alt=\"\" border=\"0\" data-original-height=\"812\" data-original-width=\"1223\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEihRvCpOjzZMIKuZ4oOMWF37iPEP-Ch-azY6fkOSutlBWNCabMQly3OUxPX0U5cnewRC3BgHXasyC-r3HAKuAqDdePbMZcSvEll0Ymw7HxBUuTgxo0iKoAuh778fEcmsHUMxMLJmTOFs5hTPDLB_2I8EM_WuEyov97WUdCBO-MPxOoVgBNc2OAX7eni0SQ\/s1600\/Extensions-Installed-1.png\"\/><\/a><\/div>\n<h2>AI Extensions Are The AI Consumption Channel That No one Talks\u00a0About\u00a0<\/h2>\n<p>Whereas\u00a0a lot of the present dialog round AI safety focuses on SaaS platforms and APIs, this report highlights a\u00a0completely different and\u00a0largely ignored channel: AI browser extensions.<\/p>\n<p>These\u00a0instruments are spreading rapidly.\u00a0About 1-in-6 enterprise customers already use not less than one AI extension, and that quantity is just\u00a0rising.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgTKCOKtwF_izZo69ZRjqmvFsDdHd52lt52hTY-2NPg2MIzxHFM-cvgKU_TTw5UKXyaZDkD1ffJtp1P7n67QRDjgcGrQCXLC3W3_0xRHN0l57AodD5Dene2kLB7oaiMDVXDc_urmyItMtHrOmBqy5-2lCU1wbmOCZbxLBcnBWcypbkoKWl2RqvtSUYDovo\/s1600\/AI-Extensions-Installed-2.png\" style=\"clear: left; display: block; float: left; padding: 1em 0px; text-align: center;\"><img decoding=\"async\" alt=\"\" border=\"0\" data-original-height=\"778\" data-original-width=\"1190\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgTKCOKtwF_izZo69ZRjqmvFsDdHd52lt52hTY-2NPg2MIzxHFM-cvgKU_TTw5UKXyaZDkD1ffJtp1P7n67QRDjgcGrQCXLC3W3_0xRHN0l57AodD5Dene2kLB7oaiMDVXDc_urmyItMtHrOmBqy5-2lCU1wbmOCZbxLBcnBWcypbkoKWl2RqvtSUYDovo\/s1600\/AI-Extensions-Installed-2.png\"\/><\/a><\/div>\n<p>Organizations could block or monitor direct entry to AI purposes. However\u00a0extensions function in another way. They\u00a0sit contained in the browser. They\u00a0can entry web page content material, consumer inputs, and session knowledge with out triggering conventional\u00a0controls.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" name=\"more\"\/><\/p>\n<p>In impact, they create an ungoverned layer of AI utilization, one which bypasses visibility and coverage enforcement.<\/p>\n<h2>AI Extensions Are Not Simply In style. They\u00a0Are\u00a0Riskier<\/h2>\n<p>It might be simple to imagine that AI extensions carry\u00a0the same threat to different extensions. The info exhibits in any other case.<\/p>\n<p>AI extensions are considerably extra harmful. They&#8217;re 60% extra prone to have a CVE than common, 3x extra prone to have entry to cookies, 2.5x\u00a0extra prone to have scripting permissions, and 2x extra\u00a0prone to be\u00a0in a position to manipulate browser\u00a0tabs.\u00a0<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAfZ5hhcKJGcOIa3qzylH1lhSSXhHeiBjiYfraXvJ8WLWJ82b09qa5hVOJrGXlpCqjd8pyDHq6fXOqClVaHkgk7xwCDOJIN62ZlE4yDYRKNl7T_4CMNtYE7kh8wfQ0Xv3fyFL6E05DiAsQzc3yF3oJb-G8JwGFfO2krcCoO4Cr4_TzXeqQj_iy2zYH2ac\/s1600\/3.jpg\" style=\"clear: left; display: block; float: left; padding: 1em 0px; text-align: center;\"><img decoding=\"async\" alt=\"\" border=\"0\" data-original-height=\"493\" data-original-width=\"1200\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAfZ5hhcKJGcOIa3qzylH1lhSSXhHeiBjiYfraXvJ8WLWJ82b09qa5hVOJrGXlpCqjd8pyDHq6fXOqClVaHkgk7xwCDOJIN62ZlE4yDYRKNl7T_4CMNtYE7kh8wfQ0Xv3fyFL6E05DiAsQzc3yF3oJb-G8JwGFfO2krcCoO4Cr4_TzXeqQj_iy2zYH2ac\/s1600\/3.jpg\"\/><\/a><\/div>\n<p>Every of those permissions carries actual implications. Cookie\u00a0entry can expose session tokens. Scripting allows knowledge extraction and manipulation. Tab\u00a0management can facilitate phishing or silent redirection.<\/p>\n<p>This mix\u00a0of quick\u00a0adoption, elevated entry, and weak governance makes AI extensions an pressing rising risk\u00a0vector.<\/p>\n<h2>Extensions Are Not Static. They\u00a0Change Over\u00a0Time<\/h2>\n<p>Safety groups typically deal with extensions as static. One thing\u00a0that may be\u00a0permitted as soon as and forgotten.\u00a0However that\u2019s not the way it\u00a0works.<\/p>\n<p>Extensions evolve. They\u00a0obtain updates. They\u00a0change possession. They\u00a0broaden permissions.<\/p>\n<p>The report exhibits that AI extensions are almost six occasions extra prone to change their permissions over time, and that greater than 60% of customers have not less than one AI extension that has modified its permissions prior to now\u00a0yr.<\/p>\n<p>This creates a transferring goal that conventional allowlists can not sustain with. An\u00a0extension that was protected yesterday will not be protected\u00a0in the present day.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhTtRjp_gXZ7Zzi3sBkuRsOhATLKtcGZW5_6nHgo78RLstzFL5zrKkRpsgiEaU-O82tMJDCMbLj9w1Zqhv_CPO6Du2wn5WHVtjukD2wVySarRJSFjK_x4usccmoUsdjyGkegj0BpYTFMsU9uCo0PSUEUQqAvyjO3H31qYaSTV_0hjKwd0pcg_KeAwTvXD4\/s1600\/Extensions-that-Changed-4.png\" style=\"clear: left; display: block; float: left; padding: 1em 0px; text-align: center;\"><img decoding=\"async\" alt=\"\" border=\"0\" data-original-height=\"493\" data-original-width=\"1376\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhTtRjp_gXZ7Zzi3sBkuRsOhATLKtcGZW5_6nHgo78RLstzFL5zrKkRpsgiEaU-O82tMJDCMbLj9w1Zqhv_CPO6Du2wn5WHVtjukD2wVySarRJSFjK_x4usccmoUsdjyGkegj0BpYTFMsU9uCo0PSUEUQqAvyjO3H31qYaSTV_0hjKwd0pcg_KeAwTvXD4\/s1600\/Extensions-that-Changed-4.png\"\/><\/a><\/div>\n<h2>The Belief Hole in Browser Extensions Is Wider Than\u00a0Anticipated<\/h2>\n<p>Safety groups depend on a spread of belief indicators to judge extensions, together with writer transparency, set up counts, replace frequency, and the presence of a privateness coverage. Whereas\u00a0these don&#8217;t straight point out malicious habits, they&#8217;re key to assessing total\u00a0threat.\u00a0<\/p>\n<p>A good portion of extensions have very low consumer bases. Extra\u00a0than 10% of all extensions have fewer than 1,000 customers, 1 \/ 4 have fewer than 5,000 customers, and a 3rd have fewer than 10,000 installations. That is notably a\u00a0problem with AI extensions, the place\u00a033% of AI extensions have fewer than 5,000\u00a0customers, and almost\u00a050% of AI extensions\u00a0have lower than 10,000\u00a0customers.A big consumer base is crucial for establishing ongoing belief, however as soon as once more, AI extensions are\u00a0displaying considerably greater\u00a0threat.<\/p>\n<p>Furthermore, round 40% of extensions haven\u2019t acquired an replace in over a yr, suggesting that they&#8217;re now not actively maintained. Extensions that aren&#8217;t recurrently up to date could comprise unresolved vulnerabilities or outdated code that attackers\u00a0exploit.<\/p>\n<p>Consequently, most extensions utilized in enterprise environments present weak or lacking indicators throughout these\u00a0areas. This raises critical questions on knowledge dealing with and compliance. It\u00a0additionally highlights how little scrutiny extensions obtain in comparison with different software program elements.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEifXhNqfufz6qclMsKH1s8JCr8PMf0b-Bxi44SzcMlj-KyGFkWrYZNlRr8PkxZmnItxxIzYkO6eNs1Tc12UBukzb-mDQemi5ulo1Hla81UDA9iaTIX6MTiSW7fO1_fRfUy3mlkElYhGm-c4eaVnl5-N0yKM0hvEpkYvN07mJzAUG2MZXCf3Wdn1JRNZt2k\/s1600\/Extensions-with-Few-Installs-5.png\" style=\"clear: left; display: block; float: left; padding: 1em 0px; text-align: center;\"><img decoding=\"async\" alt=\"\" border=\"0\" data-original-height=\"505\" data-original-width=\"643\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEifXhNqfufz6qclMsKH1s8JCr8PMf0b-Bxi44SzcMlj-KyGFkWrYZNlRr8PkxZmnItxxIzYkO6eNs1Tc12UBukzb-mDQemi5ulo1Hla81UDA9iaTIX6MTiSW7fO1_fRfUy3mlkElYhGm-c4eaVnl5-N0yKM0hvEpkYvN07mJzAUG2MZXCf3Wdn1JRNZt2k\/s1600\/Extensions-with-Few-Installs-5.png\"\/><\/a><\/div>\n<h2>Turning Perception into Motion: The Path Ahead for\u00a0CISOs<\/h2>\n<p>The report outlines a transparent path for safety\u00a0groups:<\/p>\n<ol>\n<li><strong>Repeatedly Audit The Group&#8217;s Extension Risk\u00a0Floor:<\/strong> With 99% of enterprise customers operating not less than one extension, a full stock is a compulsory first step towards threat discount. CISOs\u00a0ought to do an organization-wide extension audit overlaying all\u00a0browsers, managed and unmanaged\u00a0endpoints, throughout all\u00a0customers.<\/li>\n<li><strong>Apply\u00a0Focused Safety Controls to AI Extensions:\u00a0<\/strong>AI extensions signify an outsized threat as a consequence of their elevated permissions that may expose SaaS classes, identities, and delicate in-browser\u00a0knowledge. Organizations ought to apply stricter governance insurance policies to regulate how these extensions work together with enterprise environments.<\/li>\n<li><strong>Analyze Extension Habits, Not Simply Static Parameters:<\/strong> Static approvals are usually not enough. Threat\u00a0must be constantly assessed primarily based on permissions, habits, and adjustments over\u00a0time.\u00a0<\/li>\n<li><strong>Implement Belief and Transparency Necessities:<\/strong> Extensions which have very low set up counts, lack privateness insurance policies, or present poor upkeep historical past\u00a0needs to be\u00a0handled as greater threat. Establishing minimal belief standards helps scale back publicity to unverified or deserted extensions.<\/li>\n<\/ol>\n<h2>A New Lens On An Outdated\u00a0Downside<\/h2>\n<p>For years, browser extensions\u00a0have been\u00a0handled as a comfort characteristic. One thing to allow productiveness and customization. Nonetheless, they&#8217;re now not a peripheral threat. They\u00a0are a core a part of the enterprise assault floor. Broadly\u00a0used, extremely privileged, and largely unmonitored, they create direct publicity to delicate knowledge and consumer\u00a0classes.\u00a0<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/go.layerxsecurity.com\/browser-extension-security-report-2026?utm_source=thn&amp;utm_campaign=besr10042026\">Obtain the complete Extension Safety\u00a0report<\/a> from LayerX to know the complete scope of those findings, establish the place your publicity really lies, and get a transparent path to controlling this rising assault floor with out disrupting productiveness.<\/p>\n<div class=\"cf note-b\">Discovered this text fascinating? <span class=\"\">This text is a contributed piece from one in every of our valued companions.<\/span> Comply with us on <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ\" rel=\"noopener\" target=\"_blank\">Google Information<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/thehackersnews\" rel=\"noopener\" target=\"_blank\">Twitter<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/thehackernews\/\" rel=\"noopener\" target=\"_blank\">LinkedIn<\/a> to learn extra unique content material we publish.<\/div>\n<\/div>\n<p><template id="phFzLp8jX4La36diG62h"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whereas\u00a0a lot of the dialogue on AI safety facilities round defending\u00a0\u2018shadow\u2019 AI and GenAI consumption, there is a wide-open\u00a0window no one&#8217;s guarding: AI browser extensions.\u00a0 A\u00a0new report from LayerX\u00a0exposes simply how deep this blind spot goes, and why AI extensions stands out as the most harmful AI risk floor in your community\u00a0that is not\u00a0on anybody&#8217;s\u00a0radar. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13623,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[214,564,8604,215,1775],"class_list":["post-13621","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-browser","tag-channel","tag-consumption","tag-extensions","tag-talking"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13621"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13621\/revisions"}],"predecessor-version":[{"id":13622,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13621\/revisions\/13622"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13623"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69c6f7b5190636d50e9f6768. Config Timestamp: 2026-03-27 21:33:41 UTC, Cached Timestamp: 2026-04-10 17:32:46 UTC -->