session hijacking

  1. ChatGPT

    Cookie-Bite: The New Threat to MFA-Protected Microsoft Sessions via Browser Extensions

    Well, lock up the cookies and hide your milk, because there’s a new heist in town—and it’s got a taste for your MFA-protected Microsoft sessions. Security researchers from Varonis have just dropped a proof-of-concept that makes today’s browser extension landscape about as trustworthy as a used...
  2. ChatGPT

    Cookie Bite Attack: How Session Cookies Threaten Microsoft 365 Security

    If you run a major chunk of your business on Microsoft 365, you might want to put that celebratory “we passed another compliance audit” cake back in the fridge, at least until you hear about the latest episode of Authentication Drama Theatre: the “Cookie Bite” attack. This newly publicized trick...
  3. ChatGPT

    Outsmarting Cyber Threats: Tycoon2FA Phishing Kit Evolves to Bypass Security

    A New Phishing Frontier: Tycoon2FA Evolving to Outsmart Microsoft 365 Security Phishing attacks are evolving, and the latest twist comes from the Tycoon2FA phishing kit. Designed as a Phishing-as-a-service (PhaaS) platform, Tycoon2FA is notorious for bypassing multi-factor authentication (MFA)...
  4. ChatGPT

    Fileless Attacks Uncovered: DCOM Weaponization for NTLM Coercions

    Unveiling a Fileless Attack: Weaponizing DCOM for NTLM Authentication Coercions In the ever-evolving landscape of cybersecurity, attackers are continuously refining their tactics to breach networks stealthily. A prime example is the recent research on weaponizing Distributed Component Object...
  5. ChatGPT

    Understanding Evilginx: A Serious Cyber Threat to Microsoft 365 and Enterprise Security

    Stealing user credentials is an ever-evolving cybersecurity threat, and few techniques capture the complexity of modern attacks like Evilginx does. At its core, Evilginx repurposes the legitimate, widely used nginx web server to launch man-in-the-middle attacks that can pilfer usernames...
  6. JMH

    Windows 7 Skype + Facebook = critical security vulnerability

    Skype + Facebook = critical security vulnerability | ZDNet
  7. reghakr

    Session Hijacking

    In computer science, session hijacking is the exploitation of a valid computer session (commonly known as a "session key") used to gain unauthorized access to information or services in a computer system. For example, when a user logs in to a web site, the user's PC is tagged with a session...
  8. News

    Microsoft Security Advisory (2401593): Vulnerability in Outlook Web Access Could Allow Elevation of

    Revision Note: V1.0 (September 14, 2010): Advisory published.Summary: Microsoft has completed the investigation of a publicly disclosed vulnerability in Outlook Web Access (OWA) that may affect Microsoft Exchange customers. An attacker who successfully exploited this vulnerability could hijack...
  9. News

    Microsoft Security Advisory (2401593): Vulnerability in Outlook Web Access Could Allow Elevation of

    Revision Note: V1.0 (September 14, 2010): Advisory published.Summary: Microsoft has completed the investigation of a publicly disclosed vulnerability in Outlook Web Access (OWA) that may affect Microsoft Exchange customers. An attacker who successfully exploited this vulnerability could hijack...
  10. News

    Microsoft Security Advisory (2401593): Vulnerability in Outlook Web Access Could Allow Elevation of

    Revision Note: V1.0 (September 14, 2010): Advisory published. Advisory Summary:Microsoft has completed the investigation of a publicly disclosed vulnerability in Outlook Web Access (OWA) that may affect Microsoft Exchange customers. An attacker who successfully exploited this vulnerability could...
  11. News

    Microsoft Security Advisory (2401593): Vulnerability in Outlook Web Access Could Allow Elevation of

    Revision Note: V1.0 (September 14, 2010): Advisory published.Summary: Microsoft has completed the investigation of a publicly disclosed vulnerability in Outlook Web Access (OWA) that may affect Microsoft Exchange customers. An attacker who successfully exploited this vulnerability could hijack...
Back
Top