Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.
Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:
- Identify trends and techniques in methods used for credential theft and abuse.
- Review how cyber criminals have changed their tactics to compromise networks.
- Examine who is being targeted, and why.
- Discuss techniques to stop credential leakage.