Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Research Finds 64% of Third-Party Apps Access Sensitive Data

Research Finds 64% of Third-Party Apps Access Sensitive Data

Posted on January 21, 2026January 21, 2026 By CWS

Boston, MA, USA, January twenty first, 2026, CyberNewsWire

Reflectiz at the moment introduced the discharge of its 2026 State of Net Publicity Analysis, revealing a pointy escalation in shopper‑facet danger throughout world web sites, pushed primarily by third‑celebration purposes, advertising instruments, and unmanaged digital integrations.

In keeping with the brand new evaluation of 4,700 main web sites, 64% of third‑celebration purposes now entry delicate information with out professional enterprise justification, up from 51% final yr — a 25% yr‑over‑yr spike highlighting a widening governance hole.

The report additionally exposes a dramatic surge in malicious internet exercise throughout crucial public‑sector infrastructure. Authorities web sites noticed malicious exercise rise from 2% to 12.9%, whereas 1 in 7 Schooling web sites now present energetic compromise, quadrupling yr‑over‑yr.

Funds constraints and restricted manpower had been cited as main obstacles by public‑sector safety leaders.

The analysis identifies a number of extensively used third‑celebration instruments as high drivers of unjustified delicate‑information publicity, together with Google Tag Supervisor (8%), Shopify (5%), and Fb Pixel (4%), which had been ceaselessly discovered to be over‑permissioned or deployed with out ample scoping.

“Organizations are granting delicate‑information entry by default somewhat than exception — and attackers are exploiting that hole,” mentioned VP of Product at Reflectiz, Simon Arazi.

“This yr’s information exhibits that advertising groups proceed to introduce nearly all of third‑celebration danger, whereas IT lacks visibility into what’s truly operating on the web site.”

Key findings embrace:

64% of apps accessing delicate information haven’t any legitimate justification.

47% of purposes operating in fee frames (checkout environments) are unjustified.

Compromised websites connect with 2.7× extra exterior domains, load 2× extra trackers, and use not too long ago registered domains 3.8× extra typically than clear websites.

Advertising and Digital departments account for 43% of all third‑celebration danger

The report additionally introduces up to date Safety Management Benchmarks, highlighting the very small group of organizations assembly all eight standards. Just one web site — ticketweb.uk — achieved an ideal rating throughout the framework.

The 2026 report consists of:

Sector‑by‑sector breakdowns of internet publicity danger

Full listing of excessive‑danger third‑celebration purposes

12 months‑over‑yr trade traits

Technical indicators of compromise

Finest‑apply controls for safety and digital groups

The whole 43‑web page evaluation is on the market for obtain:

About Reflectiz

Reflectiz empowers organizations to safe their web sites and digital property towards fashionable internet threats. Its award-winning, agentless platform supplies steady visibility into all client-side exercise, detecting and prioritizing safety, privateness and compliance dangers.

Reflectiz is trusted by world enterprises throughout monetary providers, e-commerce, and healthcare to guard their information, customers, and model repute.

Contact

VP Advertising

Daniel Sharabi

Reflectiz

[email protected]

Cyber Security News Tags:Access, Apps, Data, Finds, Research, Sensitive, ThirdParty

Post navigation

Previous Post: Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
Next Post: CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training

Related Posts

Nike Allegedly Hacked by WorldLeaks Ransomware Group Nike Allegedly Hacked by WorldLeaks Ransomware Group Cyber Security News
AI Browsers Bypass Content PayWall Mimicking as a Human-User AI Browsers Bypass Content PayWall Mimicking as a Human-User Cyber Security News
New Android Spyware Disguised as an Antivirus Attacking Business Executives New Android Spyware Disguised as an Antivirus Attacking Business Executives Cyber Security News
Ni8mare Vulnerability Let Attackers Hijack n8n Servers Ni8mare Vulnerability Let Attackers Hijack n8n Servers Cyber Security News
UNC5518 Group Hacks Legitimate Websites to Inject Fake Captcha That Tricks Users to Execute Malware UNC5518 Group Hacks Legitimate Websites to Inject Fake Captcha That Tricks Users to Execute Malware Cyber Security News
EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News