Critical Infrastructure Cybersecurity Framework
T1185Collection2 Mitigations

Browser Session Hijacking

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information.

Description

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Multi-factor AuthenticationUser Training

Quick Info

Technique ID
T1185
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.