Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives Behind

Logo
Presented by

Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks

About this talk

Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials. Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will: • Identify trends and techniques in methods used for credential theft and abuse. • Review how cyber criminals have changed their tactics to compromise networks. • Examine who is being targeted, and why. • Discuss techniques to stop credential leakage.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (864)
Subscribers (105344)
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.