Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Research Finds 64% of Third-Party Apps Access Sensitive Data

Posted on January 21, 2026January 21, 2026 By CWS

Boston, MA, USA, January twenty first, 2026, CyberNewsWire

Reflectiz at the moment introduced the discharge of its 2026 State of Net Publicity Analysis, revealing a pointy escalation in shopper‑facet danger throughout world web sites, pushed primarily by third‑celebration purposes, advertising instruments, and unmanaged digital integrations.

In keeping with the brand new evaluation of 4,700 main web sites, 64% of third‑celebration purposes now entry delicate information with out professional enterprise justification, up from 51% final yr — a 25% yr‑over‑yr spike highlighting a widening governance hole.

The report additionally exposes a dramatic surge in malicious internet exercise throughout crucial public‑sector infrastructure. Authorities web sites noticed malicious exercise rise from 2% to 12.9%, whereas 1 in 7 Schooling web sites now present energetic compromise, quadrupling yr‑over‑yr.

Funds constraints and restricted manpower had been cited as main obstacles by public‑sector safety leaders.

The analysis identifies a number of extensively used third‑celebration instruments as high drivers of unjustified delicate‑information publicity, together with Google Tag Supervisor (8%), Shopify (5%), and Fb Pixel (4%), which had been ceaselessly discovered to be over‑permissioned or deployed with out ample scoping.

“Organizations are granting delicate‑information entry by default somewhat than exception — and attackers are exploiting that hole,” mentioned VP of Product at Reflectiz, Simon Arazi.

“This yr’s information exhibits that advertising groups proceed to introduce nearly all of third‑celebration danger, whereas IT lacks visibility into what’s truly operating on the web site.”

Key findings embrace:

64% of apps accessing delicate information haven’t any legitimate justification.

47% of purposes operating in fee frames (checkout environments) are unjustified.

Compromised websites connect with 2.7× extra exterior domains, load 2× extra trackers, and use not too long ago registered domains 3.8× extra typically than clear websites.

Advertising and Digital departments account for 43% of all third‑celebration danger

The report additionally introduces up to date Safety Management Benchmarks, highlighting the very small group of organizations assembly all eight standards. Just one web site — ticketweb.uk — achieved an ideal rating throughout the framework.

The 2026 report consists of:

Sector‑by‑sector breakdowns of internet publicity danger

Full listing of excessive‑danger third‑celebration purposes

12 months‑over‑yr trade traits

Technical indicators of compromise

Finest‑apply controls for safety and digital groups

The whole 43‑web page evaluation is on the market for obtain:

About Reflectiz

Reflectiz empowers organizations to safe their web sites and digital property towards fashionable internet threats. Its award-winning, agentless platform supplies steady visibility into all client-side exercise, detecting and prioritizing safety, privateness and compliance dangers.

Reflectiz is trusted by world enterprises throughout monetary providers, e-commerce, and healthcare to guard their information, customers, and model repute.

Contact

VP Advertising

Daniel Sharabi

Reflectiz

[email protected]

Cyber Security News Tags:Access, Apps, Data, Finds, Research, Sensitive, ThirdParty

Post navigation

Previous Post: Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
Next Post: CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training

Related Posts

Cybersecurity Newsletter Weekly – Chrome 0-Day, 22.2 Tbps DDOS Attack, Kali Linux Release, Cisco IOS 0-Day and More Cyber Security News
LG WebOS TV Vulnerability Let Attackers Bypass Authentication and Enable Full Device Takeover Cyber Security News
NoName057(16)’s Hackers Attacked 3,700 Unique Devices Over Last Thirteen Months Cyber Security News
Hackers Exploiting .onmicrosoft.com Domains to Launch TOAD Scam Attack Cyber Security News
Mitigating Malware Threats on Unmanaged Endpoint Devices Cyber Security News
BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
  • New Windows 11 KB5074109 Update Breaks Systems
  • ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing
  • Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
  • New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
  • New Windows 11 KB5074109 Update Breaks Systems
  • ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing
  • Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
  • New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark