DiscoverCyber Compliance & Beyond13 - Cybercrime – Credential Theft – Part 2/4
13 - Cybercrime – Credential Theft – Part 2/4

13 - Cybercrime – Credential Theft – Part 2/4

Update: 2025-04-01
Share

Description

Nothing introduces more complexity to an organization than access control as with access comes privileges. Privileges are needed for many activities within an organization. Couple the need for privileges with the complexity organizational structures and the usual personnel churn and an already complex problem becomes nearly unmanageable. Attackers target credentials for this very reason.

Compromising an end-user with no privileges may seem trivial and unlikely to cause harm. However, as we discuss in this episode, if a privileged user logged in on that end-user’s machine, their privileged credentials are now comprised, allowing the attackers to exploit other parts of the organization’s network. While the problem can reach a place of being unmanageable, there are methods and solutions available to tackle this problem.

Links:

Comments 
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

13 - Cybercrime – Credential Theft – Part 2/4

13 - Cybercrime – Credential Theft – Part 2/4

Kratos