Hundreds of popular add‑ons used encrypted, URL‑sized payloads to send search queries, referrers, and timestamps to outside servers, in some cases tied to data brokers and unknown operators.
Adversaries are moving faster and dwell times are growing. Discover why reactive security isn’t enough—and what SOCs gain with autonomous operations.