Adversaries don’t need passwords when they have your tokens!
In this webinar, Eric Clay, Chief Marketing Officer and Research Team Co-Lead and Nick Ascoli, Director Product Strategy, at Flare, will uncover the evolving tradecraft behind session hijacking and cookie theft—two increasingly common techniques leveraged by cybercriminals to bypass MFA, impersonate users, and maintain long-term persistence.
Thery will explore how threat actors harvest and weaponize session tokens, how these credentials are trafficked in the cybercrime underground, and how defenders can identify the telltale signs of a takeover. Using real-world intelligence and Flare data, this webinar will walk through:
- Common collection methods (info-stealers, XSS, token sync abuse)
- How session cookies are used in post-compromise scenarios
- Trends in cookie-based access sales on dark web markets
- Detection strategies and incident response best practices
By the end of this webinar, you’ll understand how session tokens function as high-value credentials—and how attackers exploit this blind spot to bypass even your strongest authentication controls.
Founded in 2016 as the LFPA to allow the various stakeholders in Loyalty, Fraud Prevention and Cybersecurity to collaborate on the growing issues around the security of Loyalty Programs.