How to Prevent Cookie Hijacking, A CyberArk Labs Webinar

February 8, 2022

The techniques, tactics and procedures used by nefarious characters to bypass security controls continue to evolve at a rapid pace. A technique that has proven to be effective in greasing the tracks in gaining the initial foothold is the theft of web session cookies.

Like updating passwords on a regular basis, clearing web browser cookies is a cyber hygiene practice neglected by most. If hijacked, these cookies will enable attackers with the necessary login details to bypass Multi-Factor Authentication (MFA), Single Sign-on (SSO) and gain access to critical business applications such as Jira or Slack. Threat actors can use this technique as a jumping point to deploy malicious code, social engineer and further carry out their attack.

Watch this on demand webinar to learn how cookies and session IDs can be stolen with ease and how CyberArk Endpoint Privilege Manager (EPM) threat protection can prevent this and many other emerging techniques from being used in the wild.

Attendees of this webinar will walk away with:

  • Knowledge of various cookie theft tactics
  • An example of how gaming company EA was breached when attackers bought stolen cookies on the dark web
  • How CyberArk EPM threat prevention policies prevent cookie theft on your endpoints and product demo
Previous Article
How Red Teams Challenge Thinking and Put Cyber Defenses to the Test
How Red Teams Challenge Thinking and Put Cyber Defenses to the Test

Have you ever read the popular children’s series Where’s Waldo? or looked at one of those 3D Magic Eye imag...

Next Article
NIST Authentication 101: A Guide to Save You Time and Help Reduce Risk
NIST Authentication 101: A Guide to Save You Time and Help Reduce Risk

Learn more about NIST guidelines for digital identities and Authenticator Assurance Levels.