Webinar — Malicious Browser Extensions: A Threat Modeling & Mitigation Playbook
Agenda: Malicious Browser Extensions
Attackers are doubling down on malicious browser extensions as their method of choice. Recent campaigns like ShadyPanda, ZoomStealer, GhostPoster, and the breaches impacting vendors like Cyberhaven and Trust Wallet, all highlight the threat posed by malicious extensions.
Thankfully, with the right tools and approach, organizations can take practical steps to bring the risk posed by malicious extension attacks to virtually zero.
In this webinar, you’ll learn:
- How attackers are abusing extensions in the wild
- Why malicious extensions can still be distributed via legitimate channels
- How to spot what makes an extension malicious or high-risk
- The operational pitfalls to watch out for when managing extensions
- Our step-by-step approach to securing browser extension use in your organization
This event is designed for both hands-on practitioners and security leaders looking to translate technical capabilities into tangible response outcomes.
