
Sign up to save your podcasts
Or
In this episode of The Cyber Threat Perspective, we break down how attackers steal credentials and hijack sessions to gain unauthorized access to systems and data. From phishing to cookie stealing to session token theft, we’ll explore the most common techniques and how to defend against them. Whether you're an IT admin or security pro, you’ll walk away with practical tips to help protect your users and your organization.
Recommended Conditional Access Policies to protect against account compromise: https://x.com/techspence/status/1919815226158932119
Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov
Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/mylinks
Work with Us: https://securit360.com
5
1212 ratings
In this episode of The Cyber Threat Perspective, we break down how attackers steal credentials and hijack sessions to gain unauthorized access to systems and data. From phishing to cookie stealing to session token theft, we’ll explore the most common techniques and how to defend against them. Whether you're an IT admin or security pro, you’ll walk away with practical tips to help protect your users and your organization.
Recommended Conditional Access Policies to protect against account compromise: https://x.com/techspence/status/1919815226158932119
Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov
Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/mylinks
Work with Us: https://securit360.com
360 Listeners
628 Listeners
367 Listeners
179 Listeners
1,015 Listeners
314 Listeners
392 Listeners
7,853 Listeners
167 Listeners
187 Listeners
314 Listeners
78 Listeners
117 Listeners
33 Listeners
158 Listeners