Training

Multi-factor & Risk-based Authentication , Security Operations

OnDemand | 5 Ways to Hijack Identities by Abusing the Chromium Browsers

OnDemand | 5 Ways to Hijack Identities by Abusing the Chromium Browsers

Our web browsers, which seemingly know everything about us, are prime targets for credential stealing and session hijacking attacks. Although this has been a common practice for years, the adoption of SaaS services have made browser-based attacks more prevalent than ever. Like updating passwords on a regular basis, clearing web browser cookies is a cyber hygiene practice neglected by most. If hijacked, these cookies enable attackers to bypass Multi-Factor Authentication (MFA) and Single Sign-on (SSO) security measures and gain access to critical business applications and data. Threat actors can use this technique as a jumping point to deploy malicious code, social engineer and further carry out their attack.

Join us for a demonstration in how cookies and session IDs can be stolen with ease and how CyberArk Endpoint Privilege Manager (EPM) credential theft protection can prevent these attacks. We'll also discuss:

  • Understanding of various credential and cookie theft attack vectors, including several new tactics discovered by CyberArk Labs researchers;
  • A few real-life examples of how these techniques continue to be the key for high profile breaches;
  • How CyberArk EPM threat prevention policies prevent cookie, passwords and security tokens theft on your endpoints.

Webinar Registration

This webinar is available OnDemand.

View Now


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.