Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Trending

Google Shakes Up Its Browser Agent Team Amid OpenClaw Craze

March 28, 2026

Why Walmart and OpenAI Are Shaking Up Their Agentic Shopping Deal

March 27, 2026

At Palantir’s Developer Conference, AI Is Built to Win Wars

March 26, 2026
Facebook Twitter Instagram
  • Newsletter
  • Submit Articles
  • Privacy
  • Advertise
  • Contact
Facebook Twitter Instagram
Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Subscribe for Alerts
Startup DreamersStartup Dreamers
Home » The Next Big Cyber Threat
Innovation

The Next Big Cyber Threat

adminBy adminJuly 24, 20231 ViewsNo Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email

Chief Product Officer of SpyCloud, a leader in operationalizing Cybercrime Analytics (C2A).

In 2022 alone, over 87,000 exposed credentials tied to Fortune 1000 C-level executives were recaptured from the criminal underground, according to SpyCloud’s 2023 Identity Exposure Report. The threat of falling victim to a cyberattack has become an ongoing fear for security leaders across organizations—and for good reason.

Exposed assets, including usernames and passwords, arm cybercriminals with the sensitive data required to infiltrate networks and commit crimes—including fraud, session hijacking, account takeover and ransomware attacks. Although enterprises emphasize more robust security measures, such as additional user authentication (e.g., multifactor authentication and passkeys), criminals continually evolve to develop ways to bypass these measures. One such method includes using stolen active session cookies to commit session hijacking, negating the effectiveness of these traditionally used protections.

To strengthen network defenses and protect customers, companies and security leaders must have a clearer understanding of how criminals use stolen data for gain and how organizations can protect themselves against these threats.

Burned By Cookies

Session cookies have a ubiquitous presence online. Every website and application assigns visitors a cookie or token to identify users accessing a site. This string of characters is stored on the device, making it easier to re-access the site without reentering authentication data.

Although this capability enables personalized and smooth experiences for everyday users, it poses a threat in the wrong hands. Cybercriminals using infostealer malware can exfiltrate cookies—among a plethora of other data types—from infected devices and insert them into anti-detect browsers, allowing them to appear as legitimate users in a process known as session hijacking.

Posing as a legitimate user, criminals can move through the network uninhibited to perpetuate fraud, facilitate a ransomware attack, steal critical company data and more. Because session cookies are used to authenticate a user’s identity, it doesn’t matter if the user logged in via a username and password, a passkey or completed multifactor authentication (MFA) requirements: A session cookie bypasses them all.

What’s more, criminals use infostealer malware that’s hard to detect, relatively cheap to acquire (commonly available online for only a few hundred dollars per month) and routinely successful in siphoning cookies and other fresh, high-quality data. As a result of this low-risk, high-reward method, the popularity of infostealer malware has skyrocketed.

Protect Yourself And Your Business

Cookie theft by infostealers is already very common, with more than 22 billion device and session cookie records stolen by criminals last year, according to SpyCloud research. As criminals are seeing strong success in using these cookies to access accounts and enterprises, this entry point will continue to scale. Having a plan to proactively disrupt criminal efforts is essential for businesses looking to protect their bottom line.

The latest malware is, by design, difficult to detect. Common infostealers are often nonpersistent, exfiltrating sensitive data in seconds and leaving little to no evidence of infection on the victim’s device.

With this sort of stealthy threat, employee education is crucial. Employees recognizing phishing attempts, exercising caution toward potentially malicious email attachments, websites and downloads, not sharing passwords and minimizing using unmanaged or undermanaged devices to access corporate systems and networks can decrease overall malware exposure.

Additionally, disabling “remember me” options on platform login pages and frequently deleting cookies stored in a browser reduces the risk of session hijacking, ensuring that criminals don’t obtain access to active session cookies, even in the case of malware infection.

If malware does impact employee devices—managed or personal with access to systems—businesses should employ a comprehensive post-infection remediation (PIR) strategy to proactively address the risk of stolen but still active data being used for follow-on cyberattacks. The PIR approach involves a series of steps that augment existing incident response protocols to effectively remediate infostealer-impacted devices, applications and users. Because malware-siphoned data can remain operational for months after being exfiltrated, clearing the infected device is only the first step for businesses but not the cure-all.

Using darknet data that has been ingested, curated and analyzed, security teams can get a holistic view of the compromised devices and data threatening their business. With this insight, teams can reset the exposed application information, invalidate open session cookies and patch vulnerabilities left behind. This approach mitigates damage to organizations by addressing the threat of stolen data before it spirals into a full-on security incident.

Using a PIR strategy, leaders and executives can create a successful cyber incident response plan that allows security teams to proactively reduce the threat posed by stolen session cookies and other exposed authentication data. This strategy not only decreases the enterprise’s attack surface but also protects the company from potential brand reputation and financial harm.

Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Read the full article here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Articles

From $50M Startup To AI Powerhouse: Jennifer Tejada’s PagerDuty Playbook

Innovation March 26, 2026

The Dilemma Of Profits V.S. Guardrails

Innovation March 1, 2026

As Davos & India Celebrated AI, Paris Sounded The Alarm On AI Safety

Innovation February 28, 2026

Backyard Baseball Is Getting A New Game And I’m Ready For It In July

Innovation February 27, 2026

Solving The Data Bottleneck For Physical AI

Innovation February 26, 2026

Today’s Wordle #1686 Hints And Answer For Friday, January 30

Innovation January 30, 2026
Add A Comment

Leave A Reply Cancel Reply

Editors Picks

Google Shakes Up Its Browser Agent Team Amid OpenClaw Craze

March 28, 2026

Why Walmart and OpenAI Are Shaking Up Their Agentic Shopping Deal

March 27, 2026

At Palantir’s Developer Conference, AI Is Built to Win Wars

March 26, 2026

From $50M Startup To AI Powerhouse: Jennifer Tejada’s PagerDuty Playbook

March 26, 2026

The War on Iran Puts Global Chip Supplies and AI Expansion at Risk

March 24, 2026

Latest Posts

Meta Ramps Up Efforts to Disrupt Industrialized Scamming

March 22, 2026

Yann LeCun Raises $1 Billion to Build AI That Understands the Physical World

March 21, 2026

Iran Warns US Tech Firms Could Become Targets as War Expands

March 20, 2026

‘Uncanny Valley’: Anthropic’s DOD Lawsuit, War Memes, and AI Coming for VC Jobs

March 19, 2026

Google Is Not Ruling Out Ads in Gemini

March 18, 2026
Advertisement
Demo

Startup Dreamers is your one-stop website for the latest news and updates about how to start a business, follow us now to get the news that matters to you.

Facebook Twitter Instagram Pinterest YouTube
Sections
  • Growing a Business
  • Innovation
  • Leadership
  • Money & Finance
  • Starting a Business
Trending Topics
  • Branding
  • Business Ideas
  • Business Models
  • Business Plans
  • Fundraising

Subscribe to Updates

Get the latest business and startup news and updates directly to your inbox.

© 2026 Startup Dreamers. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Press Release
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.

GET $5000 NO CREDIT