Successful attacks on systems no longer require zero-day exploits, as attackers now focus on compromising identities through methods such as bypassing MFA, hijacking sessions, or brute-forcing passwords, according to Oort. “The vast majority of successful breaches in the past year were the result of account takeover (ATO). This research illustrates just how easy enterprises are making it for attackers to target their identities and launch successful ATO attacks,” says Oort CEO, Matt Caulfield. “IAM and … More
The post Dormant accounts are a low-hanging fruit for attackers appeared first on Help Net Security.
This article has been indexed from Help Net Security
Read the original article: