Session tokens give attackers a shortcut around MFA

In this Help Net Security video, Simon Wijckmans, CEO at cside, discusses why session token theft is rising and why security teams miss it. He walks through how web applications rely on browsers to store session tokens after login often in cookies or browser storage. Any script running on the page can reach those tokens including ads analytics tools and marketing tags. Attackers use this access to steal tokens and bypass MFA giving them the … More

The post Session tokens give attackers a shortcut around MFA appeared first on Help Net Security.

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to our Newsletter