
Palo Alto, California, April sixteenth, 2025, CyberNewsWire
SquareX researchers Jeswin Mathai and Audrey Adeline shall be disclosing a brand new class of knowledge exfiltration methods at BSides San Francisco 2025. Titled “Information Splicing Assaults: Breaking Enterprise DLP from the Inside Out”, the speak will reveal a number of information splicing methods that can enable attackers to exfiltrate any delicate file or clipboard information, utterly bypassing main Information Loss Safety (DLP) distributors listed by Gartner by exploiting architectural vulnerabilities within the browser.
DLP is a core pillar of each enterprise safety stack. Information breaches may end up in extreme penalties together with IP loss, regulatory violations, fines, and extreme reputational injury. With over 60% of company information being saved within the cloud, browsers have turn out to be the first means for workers to create, entry, and share information. Consequently, the browser has turn out to be a very engaging goal for exterior attackers and insider threats alike. But, current endpoint and cloud DLP options have restricted telemetry and management over how staff work together with information on the browser.
Moreover, there are a number of distinctive challenges with regards to sustaining information lineage within the browser. This consists of managing a number of private {and professional} identities, the extensive panorama of sanctioned and shadow SaaS apps, and the quite a few pathways during which delicate information can circulation between these apps. Not like managed gadgets the place enterprises have full management over what could be put in on the gadget, staff can simply join varied SaaS companies with out the IT crew’s information or oversight.
SquareX researcher Audrey Adeline says, “Information splicing assaults are an entire recreation changer for insider threats and attackers which can be searching for to steal info from enterprises. They exploit newer browser options that have been invented lengthy after current DLP options and thus the information exfiltrated utilizing these methods are utterly uninspected, leading to full bypasses. With in the present day’s workforce closely counting on SaaS apps and cloud storage companies, any group that makes use of the browser is weak to information splicing assaults.”
As a part of the speak, they may also be releasing an open-source toolkit, “Offended Magpie”, which is able to enable pentesters and crimson groups to check their current DLP stack and higher perceive their group’s vulnerability to Information Splicing Assaults. SquareX hopes that the analysis will spotlight the extreme threats that browsers pose on information loss and function a name to motion for enterprises and distributors alike to re-think their information loss safety methods.
Upon the completion of BSides San Francisco, the SquareX crew may also be presenting at RSAC 2025 and shall be out there at Sales space S-2361, South Expo for additional discussions on the analysis.
Speak Particulars:
Title: Information Splicing Assaults: Breaking Enterprise DLP from the Inside Out
Audio system: Jeswin Mathai and Audrey Adeline
Occasion: BSides San Francisco 2025
Location: San Francisco, CA
Toolkit Launch: Offended Magpie (Open Supply)
In regards to the Audio system
Jeswin Mathai, Chief Architect, SquareX
Jeswin Mathai serves because the Chief Architect at SquareX, the place he leads the design and implementation of the corporate’s infrastructure. A seasoned speaker and researcher, Jeswin has showcased his work at prestigious worldwide levels resembling DEF CON US, DEF CON China, RootCon, Blackhat Arsenal, Recon Village, and Demo Labs at DEFCON. He has additionally imparted his information globally, coaching in-classroom classes at Black Hat US, Asia, HITB, RootCon, and OWASP NZ Day. He’s additionally the creator of widespread open-source tasks resembling AWSGoat, AzureGoat, and PAToolkit.
Audrey Adeline, Researcher
Audrey at the moment leads the 12 months of Browser Bugs (YOBB) venture at SquareX which has disclosed a number of main architectural browser vulnerabilities up to now. She can also be a printed writer of The Browser Safety Discipline Handbook. Key discoveries from YOBB embody Polymorphic Extensions, Browser Ransomware and Browser Syncjacking, all of which have been coated by main publications resembling Forbes, Bleeping Laptop and Mashable. She is obsessed with furthering cybersecurity schooling and has run a number of workshops with Stanford College and Girls in Safety and Privateness (WISP). Previous to SquareX, Audrey was a cybersecurity investor at Sequoia Capital and graduated from the College of Cambridge with a level in Pure Sciences.
About SquareX
SquareX’s industry-first Browser Detection and Response (BDR) helps organizations detect, mitigate, and threat-hunt client-side net assaults concentrating on staff occurring towards their customers in real-time. This consists of defending towards id assaults, malicious extensions, spearphishing, browser information loss, and insider threats.
SquareX takes a analysis and attack-focused method to browser safety. SquareX’s devoted analysis crew was the primary to find and disclose a number of pivotal assaults, together with Final Mile Reassembly Assaults, Browser Syncjacking, Polymorphic Extensions, and Browser-Native Ransomware. As a part of the 12 months of Browser Bugs (YOBB) venture, SquareX commits to proceed disclosing no less than one main architectural browser vulnerability each month.
Contact
Head of PR
Junice Liew
SquareX
[email protected]