{"id":28913,"date":"2023-04-17T03:27:43","date_gmt":"2023-04-17T03:27:43","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=28913"},"modified":"2023-04-17T06:18:00","modified_gmt":"2023-04-17T06:18:00","slug":"secure-your-browsers","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/","title":{"rendered":"How to Secure your Browsers from Malicious Extensions?"},"content":{"rendered":"\n<p>In the first half of 2022, <a href=\"https:\/\/ciso.economictimes.indiatimes.com\/news\/1-3m-users-faced-browser-extension-threats-in-the-first-half-of-2022\/93654363\">1.3 million users<\/a> suffered data breaches because of harmful extensions.<\/p>\n\n\n\n<p>Malicious extensions are considered major risk factors as they can easily penetrate your <a href=\"https:\/\/kalilinuxtutorials.com\/god-genesis\/\" target=\"_blank\" rel=\"noreferrer noopener\">endpoints<\/a> and cause major system compromises.<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4f4f4\">Unsigned and <a href=\"https:\/\/kalilinuxtutorials.com\/web-hackers-weapons\/\" target=\"_blank\" rel=\"noreferrer noopener\">unsafe extensions<\/a> are considered to be potentially harmful to your browsers. Browser extensions are inherently weak in terms of security. <\/p>\n\n\n\n<p>Additionally, the lack of visibility over the installed extensions, and the permissions they require, makes it impossible for IT administrators to manage them.&nbsp;<\/p>\n\n\n\n<p>Here are a few recent cases of why your browser extensions threaten your entire network.<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\" start=\"1\">\n<li>Chrome browser extension <strong>SearchBlox<\/strong> installed by more than 200,000 users, has been discovered to contain a backdoor that can steal your Roblox credentials and assets.<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\" start=\"2\">\n<li>An information-stealing Google Chrome browser extension named <strong><a href=\"https:\/\/gbhackers.com\/chrome-extension-deploy-windows-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">VenomSoftX<\/a><\/strong> is being deployed to steal cryptocurrency and clipboard contents as users browse the web.<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\" start=\"3\">\n<li>A new Chrome browser botnet named <strong>Cloud9<\/strong> has been discovered in the wild using malicious extensions to steal online accounts, log keystrokes, inject ads and malicious JS code, and enlist the victim&#8217;s browser in DDoS attacks.<\/li>\n<\/ol>\n\n\n\n<p>Let&#8217;s quickly look into one of the attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Troubles of Being on Cloud9<\/strong><\/h2>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4f4f4\">With the new browser botnet, Cloud9, waiting to penetrate your browsers remotely to access and steal your sensitive and confidential data, staying safe while browsing the internet can be challenging. <\/p>\n\n\n\n<p>As reported by Bleeping Computer, this remote access Trojan named Cloud9 allows cyberattackers to execute commands remotely to steal your data. This malicious extension is not found in the Chrome store but has been reported to be installed by other means.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What&#8217;s the story of Cloud9?<\/strong><\/h2>\n\n\n\n<p>The malicious Cloud9 extension consists of three JavaScript files that can gather system information, leverage host resources to mine cryptocurrency, perform DDoS attacks, and inject code to run browser exploits.<\/p>\n\n\n\n<p>The following exploits for vulnerabilities have been observed on various browsers:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Firefox: <strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11708\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2019-11708<\/a><\/strong> and <strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2019-9810\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2019-9810<\/a><\/strong><\/li>\n\n\n\n<li>Internet Explorer: <strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2014-6332\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2014-6332<\/a><\/strong> and <strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-0189\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2016-0189<\/a><\/strong><\/li>\n\n\n\n<li>Edge: <strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-7200\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2016-7200<\/a><\/strong><\/li>\n<\/ul>\n\n\n\n<p>These exploits automatically install and run Windows malware on the host machines, which not only can lead to further system compromises.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Learn how Browser Security Plus Provides the Right Solution against Malicious Extensions.<\/strong><\/h2>\n\n\n\n<p>With Browser Security Plus, you can manage the extensions installed on your browsers across your network. To defeat this malicious Remote Access Trojan, you must only allow the safe and wanted extensions in all your browsers.<\/p>\n\n\n\n<p>Here&#8217;s how you can manage these extensions seamlessly using Browser Security Plus<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\" start=\"1\">\n<li>Discover potentially harmful extensions being used in your network.<\/li>\n\n\n\n<li>Remove unnecessary extensions.<\/li>\n\n\n\n<li>Block permissions directly instead of blocking extensions. This will ensure that all extensions that use the blocked permissions will be removed.<\/li>\n\n\n\n<li>Gain comprehensive insights about the extensions that are installed on your browsers.<\/li>\n\n\n\n<li>Allow and block extensions based on user requirements.<\/li>\n<\/ol>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4f4f4\">To avoid extensions being installed from unknown and third-party stores, Browser Security Plus allows you to maintain your extension repository, where you can add extensions based on their extension identifier.<\/p>\n\n\n\n<p>With Browser Security Plus, you gain holistic insights into your network&#8217;s browsers, extensions, and plug-ins. <\/p>\n\n\n\n<p><strong>You can also lock down your enterprise browsers, harden your browser settings, and filter out malicious web applications to stay safe from cyberattacks. <a href=\"https:\/\/www.manageengine.com\/browser-security\/?utm_source=KaliLinux&amp;utm_medium=Website&amp;utm_campaign=BSP-Secureyourbrowsers\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Learn more<\/a> about implementing a safe browsing experience for your end users!<\/strong><\/p>\n\n\n\n<p><strong>Browser Security Plus is your one-stop solution to prevent browser-based attacks and manage multiple browsers across your enterprise network. Secure your browsers now! <a href=\"https:\/\/www.manageengine.com\/browser-security\/download.html?utm_source=KaliLinux&amp;utm_medium=Website&amp;utm_campaign=BSP-Secureyourbrowsers\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Get a free 30-day trial here<\/a>!<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the first half of 2022, 1.3 million users suffered data breaches because of harmful extensions. Malicious extensions are considered major risk factors as they can easily penetrate your endpoints and cause major system compromises. Unsigned and unsafe extensions are considered to be potentially harmful to your browsers. Browser extensions are inherently weak in terms [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":28915,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp","fifu_image_alt":"Secure your Browsers","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[3714],"class_list":["post-28913","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Secure your Browsers from Malicious Extensions?<\/title>\n<meta name=\"description\" content=\"Malicious extensions are considered major risk factors as they can easily penetrate your endpoints and cause major system compromises.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Secure your Browsers from Malicious Extensions?\" \/>\n<meta property=\"og:description\" content=\"Malicious extensions are considered major risk factors as they can easily penetrate your endpoints and cause major system compromises.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-17T03:27:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-17T06:18:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp\" \/>\n<meta name=\"author\" content=\"Shivaa Nandini R\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shivaa Nandini R\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/\"},\"author\":{\"name\":\"Shivaa Nandini R\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/ecc427e971ec5c5f9922d26726899347\"},\"headline\":\"How to Secure your Browsers from Malicious Extensions?\",\"datePublished\":\"2023-04-17T03:27:43+00:00\",\"dateModified\":\"2023-04-17T06:18:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/\"},\"wordCount\":579,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp\",\"keywords\":[\"windows\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/\",\"name\":\"How to Secure your Browsers from Malicious Extensions?\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp\",\"datePublished\":\"2023-04-17T03:27:43+00:00\",\"dateModified\":\"2023-04-17T06:18:00+00:00\",\"description\":\"Malicious extensions are considered major risk factors as they can easily penetrate your endpoints and cause major system compromises.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp\",\"width\":\"728\",\"height\":\"380\",\"caption\":\"Secure your Browsers\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/ecc427e971ec5c5f9922d26726899347\",\"name\":\"Shivaa Nandini R\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6772f8450ce5bf55099f9cbe1baf145794fc301a03104a5719fe6dec36246c5d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6772f8450ce5bf55099f9cbe1baf145794fc301a03104a5719fe6dec36246c5d?s=96&d=mm&r=g\",\"caption\":\"Shivaa Nandini R\"},\"description\":\"A passionate content writer with a strong interest in exploring the latest cybersecurity trends and solutions. I take great pleasure in writing about the various strategies that can be employed to mitigate cyber risks and safeguard organizational assets.\",\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/karthikasurendran\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Secure your Browsers from Malicious Extensions?","description":"Malicious extensions are considered major risk factors as they can easily penetrate your endpoints and cause major system compromises.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/","og_locale":"en_US","og_type":"article","og_title":"How to Secure your Browsers from Malicious Extensions?","og_description":"Malicious extensions are considered major risk factors as they can easily penetrate your endpoints and cause major system compromises.","og_url":"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-04-17T03:27:43+00:00","article_modified_time":"2023-04-17T06:18:00+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp","type":"","width":"","height":""}],"author":"Shivaa Nandini R","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Shivaa Nandini R","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/"},"author":{"name":"Shivaa Nandini R","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/ecc427e971ec5c5f9922d26726899347"},"headline":"How to Secure your Browsers from Malicious Extensions?","datePublished":"2023-04-17T03:27:43+00:00","dateModified":"2023-04-17T06:18:00+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/"},"wordCount":579,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp","keywords":["windows"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/","url":"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/","name":"How to Secure your Browsers from Malicious Extensions?","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp","datePublished":"2023-04-17T03:27:43+00:00","dateModified":"2023-04-17T06:18:00+00:00","description":"Malicious extensions are considered major risk factors as they can easily penetrate your endpoints and cause major system compromises.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp","width":"728","height":"380","caption":"Secure your Browsers"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/ecc427e971ec5c5f9922d26726899347","name":"Shivaa Nandini R","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6772f8450ce5bf55099f9cbe1baf145794fc301a03104a5719fe6dec36246c5d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6772f8450ce5bf55099f9cbe1baf145794fc301a03104a5719fe6dec36246c5d?s=96&d=mm&r=g","caption":"Shivaa Nandini R"},"description":"A passionate content writer with a strong interest in exploring the latest cybersecurity trends and solutions. I take great pleasure in writing about the various strategies that can be employed to mitigate cyber risks and safeguard organizational assets.","url":"https:\/\/kalilinuxtutorials.com\/author\/karthikasurendran\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":28668,"url":"https:\/\/kalilinuxtutorials.com\/macosthreattrack\/","url_meta":{"origin":28913,"position":0},"title":"MacOSThreatTrack : Bash Tool Used For Proactive Detection Of Malicious Activity On macOS Systems","author":"R K","date":"March 30, 2023","format":false,"excerpt":"MacOSThreatTrack is a Bash tool used for proactive detection of malicious activity on macOS systems. The tool is being tested in the beta phase, and it only gathers MacOS system information at this time. The code is poorly organized and requires significant improvements. Description Bash tool used for proactive detection\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5OMnF5_ffjwDsy3zWQn7WidYufHHwT1HE30FBdFPAsZLe1RBUi42u2CNZ8vzEbgZ-IamGNEgmMHw0ZdMc0L2Ve5wjHcSuMAEVhaIqL0SZGGsXxI49T-G6a2vchS1ELHe5WxuNY_oomHwwnQRJOhqfypqc0gnB7_YJnveAKo542MoJpKIOuQyq9Jgz\/s16000\/mac_malware.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5OMnF5_ffjwDsy3zWQn7WidYufHHwT1HE30FBdFPAsZLe1RBUi42u2CNZ8vzEbgZ-IamGNEgmMHw0ZdMc0L2Ve5wjHcSuMAEVhaIqL0SZGGsXxI49T-G6a2vchS1ELHe5WxuNY_oomHwwnQRJOhqfypqc0gnB7_YJnveAKo542MoJpKIOuQyq9Jgz\/s16000\/mac_malware.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5OMnF5_ffjwDsy3zWQn7WidYufHHwT1HE30FBdFPAsZLe1RBUi42u2CNZ8vzEbgZ-IamGNEgmMHw0ZdMc0L2Ve5wjHcSuMAEVhaIqL0SZGGsXxI49T-G6a2vchS1ELHe5WxuNY_oomHwwnQRJOhqfypqc0gnB7_YJnveAKo542MoJpKIOuQyq9Jgz\/s16000\/mac_malware.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5OMnF5_ffjwDsy3zWQn7WidYufHHwT1HE30FBdFPAsZLe1RBUi42u2CNZ8vzEbgZ-IamGNEgmMHw0ZdMc0L2Ve5wjHcSuMAEVhaIqL0SZGGsXxI49T-G6a2vchS1ELHe5WxuNY_oomHwwnQRJOhqfypqc0gnB7_YJnveAKo542MoJpKIOuQyq9Jgz\/s16000\/mac_malware.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":17473,"url":"https:\/\/kalilinuxtutorials.com\/jarm\/","url_meta":{"origin":28913,"position":1},"title":"Jarm : Active Transport Layer Security (TLS) server fingerprinting tool","author":"R K","date":"August 15, 2021","format":false,"excerpt":"JARM is an active Transport Layer Security (TLS) server fingerprinting tool. JARM fingerprints can be used to: Quickly verify that all servers in a group have the same TLS configuration.Group disparate servers on the internet by configuration, identifying that a server may belong to Google vs. Salesforce vs. Apple, for\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":28907,"url":"https:\/\/kalilinuxtutorials.com\/red-team-browser-extension\/","url_meta":{"origin":28913,"position":2},"title":"HackTools &#8211; All-in-one Red Team Browser Extension For Web Pentesters","author":"Linumonk","date":"April 13, 2023","format":false,"excerpt":"The primary responsibility of red teaming is to assess malicious actors and attempt to breach the system genuinely. Red teaming's motto is to mitigate cognitive errors such as groupthink and confirmation bias, which can impede an organization's or individual's decision-making ability. Red teaming is a cybersecurity training approach commonly utilized\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"Red Team Browser Extension","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3y3tSPJJu_1yUMgT8g61GVxVnXrM3QOfl-dknS2QLEcrDSEEPzwQMvlaHp-gmpacxJ2zNh7R31WaOfiTt5yI5sop5tCJYfhbnBNZUYkyOlL_DSRtwJsSPH2bt0Rcb7uSmDvkA8zkOvi0HfzKfIYBZrhADiBG3vwHVpYxL6kprmCAzZMbTDE_qMsEzSQ\/s16000\/All-in-one%20Red%20Team%20Browser%20Extension.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3y3tSPJJu_1yUMgT8g61GVxVnXrM3QOfl-dknS2QLEcrDSEEPzwQMvlaHp-gmpacxJ2zNh7R31WaOfiTt5yI5sop5tCJYfhbnBNZUYkyOlL_DSRtwJsSPH2bt0Rcb7uSmDvkA8zkOvi0HfzKfIYBZrhADiBG3vwHVpYxL6kprmCAzZMbTDE_qMsEzSQ\/s16000\/All-in-one%20Red%20Team%20Browser%20Extension.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3y3tSPJJu_1yUMgT8g61GVxVnXrM3QOfl-dknS2QLEcrDSEEPzwQMvlaHp-gmpacxJ2zNh7R31WaOfiTt5yI5sop5tCJYfhbnBNZUYkyOlL_DSRtwJsSPH2bt0Rcb7uSmDvkA8zkOvi0HfzKfIYBZrhADiBG3vwHVpYxL6kprmCAzZMbTDE_qMsEzSQ\/s16000\/All-in-one%20Red%20Team%20Browser%20Extension.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3y3tSPJJu_1yUMgT8g61GVxVnXrM3QOfl-dknS2QLEcrDSEEPzwQMvlaHp-gmpacxJ2zNh7R31WaOfiTt5yI5sop5tCJYfhbnBNZUYkyOlL_DSRtwJsSPH2bt0Rcb7uSmDvkA8zkOvi0HfzKfIYBZrhADiBG3vwHVpYxL6kprmCAzZMbTDE_qMsEzSQ\/s16000\/All-in-one%20Red%20Team%20Browser%20Extension.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":2669,"url":"https:\/\/kalilinuxtutorials.com\/burp-extensions\/","url_meta":{"origin":28913,"position":3},"title":"Burp Extensions &#8211; Burp Suite Extensions For The New Burp Suite API v1.5+","author":"R K","date":"September 15, 2018","format":false,"excerpt":"Burp Extensions collection of extensions for the new Burp Suite API (v1.5+) using Submodules for easy collection and updating. If you want to add a new module to the collection just send a Pull request or create an Issue. If you want your collection removed create an Issue. The following\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":37153,"url":"https:\/\/kalilinuxtutorials.com\/maldoc-in-pdf\/","url_meta":{"origin":28913,"position":4},"title":"MalDoc In PDF : A Novel Technique For Evading Detection","author":"Varshini","date":"March 20, 2025","format":false,"excerpt":"The cybersecurity community has recently been alerted to a sophisticated attack method known as \"MalDoc in PDF,\" which involves embedding a malicious Microsoft Word file within a seemingly harmless PDF document. This technique, identified by JPCERT\/CC, allows attackers to bypass traditional security measures by exploiting the dual nature of these\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MalDoc-In-PDF.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MalDoc-In-PDF.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MalDoc-In-PDF.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MalDoc-In-PDF.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MalDoc-In-PDF.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MalDoc-In-PDF.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":37250,"url":"https:\/\/kalilinuxtutorials.com\/verizon-ai-burp-extensions\/","url_meta":{"origin":28913,"position":5},"title":"Verizon AI Burp Extensions (VAIBE) : Revolutionizing AI Security Testing","author":"Varshini","date":"March 24, 2025","format":false,"excerpt":"Verizon AI Burp Extensions (VAIBE) is a cutting-edge suite of tools designed to enhance the capabilities of penetration testers and security researchers working with AI applications. Developed in Jython and integrated into Burp Suite, VAIBE provides advanced functionalities for prompt-based security testing, HTTP transaction analysis, and conversational evaluations of large\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Verizon-AI-Burp-Extensions.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Verizon-AI-Burp-Extensions.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Verizon-AI-Burp-Extensions.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Verizon-AI-Burp-Extensions.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Verizon-AI-Burp-Extensions.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Verizon-AI-Burp-Extensions.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=28913"}],"version-history":[{"count":2,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28913\/revisions"}],"predecessor-version":[{"id":28916,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28913\/revisions\/28916"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/28915"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=28913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=28913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=28913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}