Neon Cyber Logo
Back to Blog

How the Browser Became the Most Dangerous Place to Work. Unnoticed.

Work moved to the browser. Risk followed. Controls didn't. Why the session layer is the most critical — and least defended — part of your attack surface.

workforce browser attack surface

TL;DR

We built security for a world where the browser was just a window. Today, it’s where work gets done. It’s where AI runs. Risk moved there. Most controls didn’t.


For years, we treated the browser as plumbing. Important, yes. Strategic, no.

It was simply how people reached systems where the real work happened. Execution lived on servers. Risk lived on endpoints. Security controls existed at the perimeter. The browser was a conduit, not a control surface.

That model worked for the world we had.

It no longer reflects the world we’re in now.

How the browser quietly became the workplace

Open any worker’s laptop and count the tabs. CRM. Finance. HR. Internal dashboards. Customer support. Procurement. Collaboration. And now generative AI.

Approvals happen inside those tabs. Data is copied and pasted there. Files are uploaded and downloaded there. Decisions are made there.

The browser is no longer a path to work. It’s the environment where work is executed.

Industry research consistently shows that the majority of daily knowledge work now happens in browser-based applications. Some workforce studies estimate that around 85 percent of enterprise work is conducted in the browser.

At the same time, Omdia research has found that 95 percent of organizations have experienced browser-based attacks.

Most work happens in the browser. Most attacks touch the browser. Yet most security architecture still treats it as a simple transit layer.

That disconnect isn’t subtle. It’s structural. And it’s being exploited millions of times every day.

We secured the edges. Work moved to the middle.

Modern security stacks are sophisticated. We authenticate users before access. We inspect traffic before delivery. We monitor endpoints. We collect logs. None of that is misguided. But those controls are anchored to moments in time and to locations outside the browser session itself.

Once a user is authenticated and actively working inside a web application, what governs behavior in that session? What monitors sensitive data being pasted into forms? What intervenes when a file is uploaded into a third-party tool?

In many organizations, the honest answer is very little.

There may be visibility into sanctioned SaaS through SSO. There may be telemetry from endpoints. There may be alerts triggered after an event. But the place where decisions are actually executed is often lightly controlled, if at all.

“Consistent with CrowdStrike Intelligence’s prediction, both eCrime and targeted intrusion adversaries continued to target cloud-based SaaS applications throughout the last year. Performing exfiltration from SaaS applications is an effective technique, as these platforms host high volumes of critical data but are often not subject to the same heavy security monitoring as on-premises systems. Moreover, threat actors face a low technical barrier to navigating SaaS platforms, as users typically access these applications using a browser graphical user interface.” CrowdStrike Global Threat Report 2026

AI didn’t create the gap. It exposed it.

Generative AI accelerated what was already happening.

When ChatGPT was unleashed, it was accessed through the browser. Today, prompts are typed into web interfaces. Sensitive information is pasted into forms. Files are uploaded directly from local machines into external platforms.

Recent industry reports indicate that a significant proportion of employees paste company data into generative AI tools, often through unmanaged accounts outside centralized SSO visibility.

This isn’t fringe behavior. It’s productivity.

AI compresses time. What used to take days of review and correlation, conferring with peers to confirm findings and analysis, can now be done in minutes by entering data into a text box. That shift increases speed and efficiency. It also increases exposure when controls aren’t present inside the session.

The browser has become a high velocity risk surface because that is where work now happens.

Not because employees are careless. Because they are effective.

This is an architectural shift, not a user failure

Security teams didn’t suddenly become inattentive. The environment changed over time.

Cloud adoption shifted applications into web interfaces. SaaS removed local clients. Business units adopted new tools that required nothing more than a browser and an email address.

Control stayed anchored to the earlier model. We continued to focus on who gets access and on what happens after an incident is detected.

Meanwhile, risk moved into the session itself.

We are protecting entry points while sensitive actions unfold inside the room.

The uncomfortable question

If the browser is now the runtime for modern work and increasingly for AI-assisted decisions, why is it still treated as a secondary layer in security architecture?

Why do we invest heavily in authentication but far less in controlling behavior after login?

Why are we comfortable seeing what happened yesterday, but not intervening while it happens?

Your workforce has already moved. AI is already embedded in daily workflows. The browser is already the operating environment.

The only open question is whether control has moved there too.

If it hasn’t, then the most critical layer of your attack surface is the one you are still treating as plumbing.

And that isn’t a position any security leader wants to defend.

Neon Cyber

Protect the People that power your business

Subscribe to the Neon Glow-Up!

Get the latest news and updates from our team.

By subscribing, you agree to our Privacy Policy

Copyright © 2025 Neon Cyber Inc. All rights reserved.