Source |
MitnickSecurity |
Identifiant |
8494654 |
Date de publication |
2024-05-06 14:31:18 (vue: 2024-05-06 15:06:57) |
Titre |
Qu'est-ce que la récolte d'identification et comment les acteurs de la menace le réalisent-ils? What Is Credential Harvesting and How Do Threat Actors Pull It Off? |
Texte |
79% Les comptes d'entreprise ont été compromis par les acteurs de la menace utilisant des tactiques de récolte d'identification, telles que le phishing des informations d'identification.
Credential harvesting, otherwise known as credential compromising or credential theft, can be a highly devastating cyber threat. It also happens to be very successful, as over 79% of business accounts were compromised by threat actors using credential harvesting tactics, such as credential phishing. |
Notes |
★★
|
Envoyé |
Oui |
Condensat |
accounts actors also business can compromised compromising credential cyber devastating happens harvesting highly how known off otherwise over phishing pull successful such tactics theft threat using very what |
Tags |
Threat
|
Stories |
|
Move |
|