Home » Palo Alto Networks acknowledges browser malware risks, validating SquareX’s LMR attack findings

Palo Alto Networks acknowledges browser malware risks, validating SquareX’s LMR attack findings

by Wikdaily
0 comments
Hacker with malware code in computer screen. Cybersecurity, privacy or cyber attack. Programmer or fraud criminal writing virus software. Online firewall and privacy crime. Web data engineer.


Adeline said this exposure is far from theoretical, as SquareX has been detecting and protecting customers against them. “LMR allows attackers to smuggle any malicious script, site, or file — including known phishing sites and malware – that completely bypasses SWGs,” she explained. “Once it’s inside the browser, enterprises face credential theft, data exfiltration, and monitoring attacks without any oversight from their existing tools.”

SquareX researchers have extended these findings into “Data Splicing Attacks,” showing that attackers, or even insiders, can use similar techniques to exfiltrate sensitive data. Whether through copy-paste operations or peer-to-peer file sharing sites, the data sneaks past traditional data loss prevention (DLP) controls undetected.

According to Adeline, securing channels like WebRTC and gRPC is tough with traditional SASE or SSE tools, which lack browser-level visibility and often force enterprises to block them entirely. Browser-native security, she said, can protect these channels at the “last mile” in the browser by blocking malicious downloads, inspecting phishing sites or malicious scripts in real time.

You may also like

Leave a Comment

Welcome to WikDaily, your trusted source for the latest news, trends, and insights across the globe. We are a dynamic blog-style news platform committed to delivering fast, accurate, and engaging content across a variety of topics—from breaking headlines to deep dives into tech, business, entertainment, travel, sports, and more.

Edtior's Picks

Latest Articles