Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsNew Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification
New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification
Cybersecurity

New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification

•January 14, 2026
0
The Hacker News
The Hacker News•Jan 14, 2026

Why It Matters

Unjustified third‑party access expands the attack surface and fuels data breaches, forcing organizations to tighten governance and invest in specialized exposure management tools.

Key Takeaways

  • •64% apps access data without justification, up 13 points
  • •Only 39% deployed web exposure defenses
  • •Google Tag Manager causes 8% of violations
  • •Government malicious activity rose to 12.9%
  • •Marketing creates 43% of third‑party risk

Pulse Analysis

Web Exposure Management has emerged as a critical discipline as organizations increasingly rely on third‑party scripts for analytics, marketing and payments. Each additional tag or pixel widens the attack surface, allowing malicious actors to harvest credentials or inject code when vendors are compromised. The 2026 Reflectiz study, covering 4,700 sites, reveals a steep rise in unjustified data access, underscoring the need for granular permission models and continuous runtime monitoring rather than static, perimeter‑only defenses.

The sector breakdown paints a stark picture: government portals experienced a six‑fold surge in malicious activity, and education sites now see one in seven compromised. Marketing teams, responsible for 43% of third‑party risk, often deploy tools without IT oversight, leading to over‑permissioned scripts that scrape payment fields or personal identifiers. This cultural disconnect explains why 61% of security leaders are still evaluating solutions, leaving a large portion of the market exposed despite high executive awareness.

Addressing the gap requires three practical steps. First, conduct a comprehensive inventory of all trackers, validate business justification, and retire those that lack a clear purpose. Second, implement automated, context‑aware monitoring that flags unauthorized DOM access or data exfiltration in real time. Finally, establish joint governance frameworks that bring CISO and CMO teams together to review risk versus ROI for each third‑party integration. Organizations that adopt these measures are already achieving top‑tier security benchmarks, demonstrating that disciplined oversight can dramatically reduce exposure without stifling digital innovation.

New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...