Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives Behind

Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials. 

Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will: 

  • Identify trends and techniques in methods used for credential theft and abuse.
  • Review how cyber criminals have changed their tactics to compromise networks.
  • Examine who is being targeted, and why.
  • Discuss techniques to stop credential leakage.