Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Trending

OpenAI’s President Gave Millions to Trump. He Says It’s for Humanity

February 18, 2026

Meta Goes to Trial in a New Mexico Child Safety Case. Here’s What’s at Stake

February 16, 2026

Salesforce Workers Circulate Open Letter Urging CEO Marc Benioff to Denounce ICE

February 15, 2026
Facebook Twitter Instagram
  • Newsletter
  • Submit Articles
  • Privacy
  • Advertise
  • Contact
Facebook Twitter Instagram
Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Subscribe for Alerts
Startup DreamersStartup Dreamers
Home » The Next Big Cyber Threat
Innovation

The Next Big Cyber Threat

adminBy adminJuly 24, 20230 ViewsNo Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email

Chief Product Officer of SpyCloud, a leader in operationalizing Cybercrime Analytics (C2A).

In 2022 alone, over 87,000 exposed credentials tied to Fortune 1000 C-level executives were recaptured from the criminal underground, according to SpyCloud’s 2023 Identity Exposure Report. The threat of falling victim to a cyberattack has become an ongoing fear for security leaders across organizations—and for good reason.

Exposed assets, including usernames and passwords, arm cybercriminals with the sensitive data required to infiltrate networks and commit crimes—including fraud, session hijacking, account takeover and ransomware attacks. Although enterprises emphasize more robust security measures, such as additional user authentication (e.g., multifactor authentication and passkeys), criminals continually evolve to develop ways to bypass these measures. One such method includes using stolen active session cookies to commit session hijacking, negating the effectiveness of these traditionally used protections.

To strengthen network defenses and protect customers, companies and security leaders must have a clearer understanding of how criminals use stolen data for gain and how organizations can protect themselves against these threats.

Burned By Cookies

Session cookies have a ubiquitous presence online. Every website and application assigns visitors a cookie or token to identify users accessing a site. This string of characters is stored on the device, making it easier to re-access the site without reentering authentication data.

Although this capability enables personalized and smooth experiences for everyday users, it poses a threat in the wrong hands. Cybercriminals using infostealer malware can exfiltrate cookies—among a plethora of other data types—from infected devices and insert them into anti-detect browsers, allowing them to appear as legitimate users in a process known as session hijacking.

Posing as a legitimate user, criminals can move through the network uninhibited to perpetuate fraud, facilitate a ransomware attack, steal critical company data and more. Because session cookies are used to authenticate a user’s identity, it doesn’t matter if the user logged in via a username and password, a passkey or completed multifactor authentication (MFA) requirements: A session cookie bypasses them all.

What’s more, criminals use infostealer malware that’s hard to detect, relatively cheap to acquire (commonly available online for only a few hundred dollars per month) and routinely successful in siphoning cookies and other fresh, high-quality data. As a result of this low-risk, high-reward method, the popularity of infostealer malware has skyrocketed.

Protect Yourself And Your Business

Cookie theft by infostealers is already very common, with more than 22 billion device and session cookie records stolen by criminals last year, according to SpyCloud research. As criminals are seeing strong success in using these cookies to access accounts and enterprises, this entry point will continue to scale. Having a plan to proactively disrupt criminal efforts is essential for businesses looking to protect their bottom line.

The latest malware is, by design, difficult to detect. Common infostealers are often nonpersistent, exfiltrating sensitive data in seconds and leaving little to no evidence of infection on the victim’s device.

With this sort of stealthy threat, employee education is crucial. Employees recognizing phishing attempts, exercising caution toward potentially malicious email attachments, websites and downloads, not sharing passwords and minimizing using unmanaged or undermanaged devices to access corporate systems and networks can decrease overall malware exposure.

Additionally, disabling “remember me” options on platform login pages and frequently deleting cookies stored in a browser reduces the risk of session hijacking, ensuring that criminals don’t obtain access to active session cookies, even in the case of malware infection.

If malware does impact employee devices—managed or personal with access to systems—businesses should employ a comprehensive post-infection remediation (PIR) strategy to proactively address the risk of stolen but still active data being used for follow-on cyberattacks. The PIR approach involves a series of steps that augment existing incident response protocols to effectively remediate infostealer-impacted devices, applications and users. Because malware-siphoned data can remain operational for months after being exfiltrated, clearing the infected device is only the first step for businesses but not the cure-all.

Using darknet data that has been ingested, curated and analyzed, security teams can get a holistic view of the compromised devices and data threatening their business. With this insight, teams can reset the exposed application information, invalidate open session cookies and patch vulnerabilities left behind. This approach mitigates damage to organizations by addressing the threat of stolen data before it spirals into a full-on security incident.

Using a PIR strategy, leaders and executives can create a successful cyber incident response plan that allows security teams to proactively reduce the threat posed by stolen session cookies and other exposed authentication data. This strategy not only decreases the enterprise’s attack surface but also protects the company from potential brand reputation and financial harm.

Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Read the full article here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Articles

Today’s Wordle #1686 Hints And Answer For Friday, January 30

Innovation January 30, 2026

Today’s Wordle #1685 Hints And Answer For Thursday, January 29

Innovation January 29, 2026

Today’s Wordle #1684 Hints And Answer For Wednesday, January 28

Innovation January 28, 2026

U.S. Revamps Wildfire Response Into Modern Central Organization

Innovation January 27, 2026

Studies Are Increasingly Finding High Blood Sugar May Be Associated With Dementia

Innovation January 26, 2026

Google’s Last Minute Offer For Pixel Customers

Innovation January 25, 2026
Add A Comment

Leave A Reply Cancel Reply

Editors Picks

OpenAI’s President Gave Millions to Trump. He Says It’s for Humanity

February 18, 2026

Meta Goes to Trial in a New Mexico Child Safety Case. Here’s What’s at Stake

February 16, 2026

Salesforce Workers Circulate Open Letter Urging CEO Marc Benioff to Denounce ICE

February 15, 2026

Jeffrey Epstein Advised an Elon Musk Associate on Taking Tesla Private

February 14, 2026

AI Industry Rivals Are Teaming Up on a Startup Accelerator

February 13, 2026

Latest Posts

How iPhones Made a Surprising Comeback in China

February 10, 2026

Loyalty Is Dead in Silicon Valley

February 9, 2026

Epstein Files Reveal Peter Thiel’s Elaborate Dietary Restrictions

February 7, 2026

The Tech Elites in the Epstein Files

February 6, 2026

Elon Musk Is Rolling xAI Into SpaceX—Creating the World’s Most Valuable Private Company

February 5, 2026
Advertisement
Demo

Startup Dreamers is your one-stop website for the latest news and updates about how to start a business, follow us now to get the news that matters to you.

Facebook Twitter Instagram Pinterest YouTube
Sections
  • Growing a Business
  • Innovation
  • Leadership
  • Money & Finance
  • Starting a Business
Trending Topics
  • Branding
  • Business Ideas
  • Business Models
  • Business Plans
  • Fundraising

Subscribe to Updates

Get the latest business and startup news and updates directly to your inbox.

© 2026 Startup Dreamers. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Press Release
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.

GET $5000 NO CREDIT