Skip to content

browser security

2 posts with the tag “browser security”

Typosquatting: When One Wrong Letter Hands Over Your Credentials

Comparison of a legitimate URL and a typosquatted URL showing how replacing the letter m with rn creates a convincing lookalike domain

Type “gogle.com” into your browser. You misspelled it. Twenty years ago, that typo would have landed you on a page stuffed with ads. Today, it might land you on a pixel-perfect replica of Google’s login page, one that captures your username and password before redirecting you to the real thing. You would never know.

This is typosquatting, and it has been around since domain names became valuable. What changed is the sophistication. Modern typosquatting campaigns do not just buy obvious misspellings. They register domains using character substitutions that are nearly invisible to the human eye, pair them with valid HTTPS certificates, and deploy them as part of targeted credential-harvesting operations against specific companies.

Palo Alto Networks’ Unit 42 found that roughly 13,857 squatting domains were registered per month in 2023, with typosquatting and combosquatting accounting for the majority. These are not opportunistic parked pages. Many are active phishing sites with a shelf life measured in hours, just long enough to harvest a batch of credentials before being reported and taken down.

Browser Security Training: What Employees Actually Need to Know

Browser security training - browser window with protective shield against web-based cyber threats

An employee searches Google for a PDF converter. The first result looks right. Logo, branding, download button. She installs it. Within 48 hours, her browser credentials, saved passwords, and session tokens are exfiltrated to a server in Eastern Europe. The download page was a poisoned search result that ranked above the legitimate tool.

This is not a theoretical scenario. Palo Alto Unit 42 reported in 2024 that web browsers have become the number one enterprise attack vector, involved in over 80% of initial access incidents. Your firewall, endpoint agent, and email gateway don’t help much when the threat lives inside the browser itself.

Browsers have quietly become the operating system of work. SaaS apps, cloud consoles, internal tools, communication platforms. Nearly everything runs in a browser tab. And every one of those tabs is a potential attack surface that most security training ignores.