How to Prevent Cookie Hijacking, A CyberArk Labs Webinar

February 8, 2022

The techniques, tactics and procedures used by nefarious characters to bypass security controls continue to evolve at a rapid pace. A technique that has proven to be effective in greasing the tracks in gaining the initial foothold is the theft of web session cookies.

Like updating passwords on a regular basis, clearing web browser cookies is a cyber hygiene practice neglected by most. If hijacked, these cookies will enable attackers with the necessary login details to bypass Multi-Factor Authentication (MFA), Single Sign-on (SSO) and gain access to critical business applications such as Jira or Slack. Threat actors can use this technique as a jumping point to deploy malicious code, social engineer and further carry out their attack.

Watch this on demand webinar to learn how cookies and session IDs can be stolen with ease and how CyberArk Endpoint Privilege Manager (EPM) threat protection can prevent this and many other emerging techniques from being used in the wild.

Attendees of this webinar will walk away with:

  • Knowledge of various cookie theft tactics
  • An example of how gaming company EA was breached when attackers bought stolen cookies on the dark web
  • How CyberArk EPM threat prevention policies prevent cookie theft on your endpoints and product demo
Previous Article
CyberArk Endpoint Privilege Manager for Amazon WorkSpaces Solution Brief
CyberArk Endpoint Privilege Manager for Amazon WorkSpaces Solution Brief

The joint solution helps reduce privileged access security risks by removing local admin rights, while temp...

Next Video
Endpoint Least Privilege: A Foundational Security Control
Endpoint Least Privilege: A Foundational Security Control

Amidst the current ransomware surge, it's time for the principle of least privilege to meet endpoint securi...