Credential abuse attacks have become a prevalent threat in recent years, and a successful credential abuse attack campaign can result in damaging consequences such as losing access and control over the accounts, data breach and fraudulent transactions.
Many of the accounts being abused are compromised account, which are the result of information breach in vulnerable web applications. The problem starts once visitors of highly-secured web applications create login credentials and then recycle those credentials to access another potentially vulnerable web application.
In this webinar, Akamai will present our latest research on malicious activity that sheds new light on credential abuse attack campaigns characteristics. The research reveals the techniques that are being used and what make these campaigns difficult to detect over long periods of time. We will show how collaboration of attack evidence on different targets can become a solution to mitigate such attacks.
The speakers will also share key attack data and trends observed from the latest Akamai Q2 2017 State of the Internet Security Report.
Join Akamai and (ISC)² on Aug 30 (Wed) at 13:00 (Singapore time) to learn more about improving credential abuse threat mitigation.
Presenters:
- Or Katz, Principal Lead Security Researcher, Akamai
- James Tin, Principal Enterprise Security Architect, Akamai
Moderator:
- Clayton Jones, Managing Director, APAC, (ISC)²