Dormant accounts are a low-hanging fruit for attackers

Successful attacks on systems no longer require zero-day exploits, as attackers now focus on compromising identities through methods such as bypassing MFA, hijacking sessions, or brute-forcing passwords, according to Oort. “The vast majority of successful breaches in the past year were the result of account takeover (ATO). This research illustrates just how easy enterprises are making it for attackers to target their identities and launch successful ATO attacks,” says Oort CEO, Matt Caulfield. “IAM and … More

The post Dormant accounts are a low-hanging fruit for attackers appeared first on Help Net Security.

This article has been indexed from Help Net Security

Read the original article: