Threat actors have moved away from exploiting vulnerabilities in favor of a far easier method to breach networks—simply logging in with stolen credentials. To view this email as a web page,
click here | | | | Attendees of this live webcast may be eligible for CPE credit | |
| |
|
| | Threat actors have moved away from exploiting vulnerabilities in favor of a far easier method to breach networks—simply logging in with stolen credentials. Infostealers and phishing kits have evolved to bypass MFA protections by harvesting both credentials and tokens for Microsoft accounts and VPN devices, while social engineering attacks convince corporate help desks to give attackers access. Don't miss tomorrow's webcast! We will analyze the growing use of credential-based intrusions, provide insight into how logins are used to breach networks. Attendees will learn how to harden identity platforms, detect compromised accounts, and deploy defenses to prevent lateral movement in a compromised network. | |
| |
|
| | | Attendees will learn: The attack paths behind infostealer-driven credential harvesting How attackers compromise Microsoft accounts and MFA in adversary-in-the-middle phishing attacks How to detect credential abuse and session hijacking, and recover from a credentials-based compromise | |
| |
|
|
|
..