×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

How to Prevent Cookie Hijacking, A CyberArk Labs Webinar

February 8, 2022

The techniques, tactics and procedures used by nefarious characters to bypass security controls continue to evolve at a rapid pace. A technique that has proven to be effective in greasing the tracks in gaining the initial foothold is the theft of web session cookies.

Like updating passwords on a regular basis, clearing web browser cookies is a cyber hygiene practice neglected by most. If hijacked, these cookies will enable attackers with the necessary login details to bypass Multi-Factor Authentication (MFA), Single Sign-on (SSO) and gain access to critical business applications such as Jira or Slack. Threat actors can use this technique as a jumping point to deploy malicious code, social engineer and further carry out their attack.

Watch this on demand webinar to learn how cookies and session IDs can be stolen with ease and how CyberArk Endpoint Privilege Manager (EPM) threat protection can prevent this and many other emerging techniques from being used in the wild.

Attendees of this webinar will walk away with:

  • Knowledge of various cookie theft tactics
  • An example of how gaming company EA was breached when attackers bought stolen cookies on the dark web
  • How CyberArk EPM threat prevention policies prevent cookie theft on your endpoints and product demo
Previous Video
Controlling Privilege and Identity During Incident Response
Controlling Privilege and Identity During Incident Response

CyberArk’s Remediation Services team lays out the principles behind robust Incident Response plans, practic...

Next Article
How Docker Made Me More Capable and the Host Less Secure
How Docker Made Me More Capable and the Host Less Secure

TL;DR After Docker released a fix [1] for CVE-2021-21284 [2], it unintentionally created a new vulnerabilit...