Credential-Based Attacks: Exposing the Ecosystem and Motives Behind Credential Phishing, Theft and Abuse

In this white paper, Unit 42 details the ecosystem behind how adversaries steal and leverage legitimate credentials to break in and move laterally within the organization, often bypassing security controls. Learn the key attack methods currently in use, how this technique fits into attacker playbooks, and real-world guidance on preventing successful attacks.


 

AV-Comparatives 

AV-Comparatives, the independent organization that tests and assesses antivirus (AV) software, announced the completion of its 2017 “Comparison of Next-Generation Security Products” and presented Traps advanced endpoint protection with its “Approved” award. The firm conducted a series of malware protection and exploit prevention tests on Traps during September and October 2017. Download the report to view the results of this test.
  • 4
  • 12911

WildFire Datasheet

WildFire Datasheet
  • 7
  • 27799

Threat Prevention Datasheet

Today’s attackers are well-funded and well-equipped. They use evasive tactics to succeed in gaining a foothold in the network, launching both high-volume and sophisticated attacks while remaining invisible to an organization’s traditional defenses – from packet obfuscation, polymorphic malware and encryption to multi-phased payloads and fast-flux DNS.
  • 1
  • 22493

Security Lifecycle Review

Security Lifecycle Review
  • 6
  • 6959

WildFire Appliance (WF-500)

The WildFire Appliance WF-500 automatically detects and prevents zero-day exploits and malware with on-premise analysis that meets privacy and regulatory requirements.
  • 2
  • 4652

Actionable Security Intelligence

This white paper describes how Palo Alto Network next-generation firewalls and Panorama help you get actionable security insights.
  • 27
  • 14622