Listen "13 - Cybercrime – Credential Theft – Part 2/4"
Episode Synopsis
Nothing introduces more complexity to an organization than access control as with access comes privileges. Privileges are needed for many activities within an organization. Couple the need for privileges with the complexity organizational structures and the usual personnel churn and an already complex problem becomes nearly unmanageable. Attackers target credentials for this very reason. Compromising an end-user with no privileges may seem trivial and unlikely to cause harm. However, as we discuss in this episode, if a privileged user logged in on that end-user's machine, their privileged credentials are now comprised, allowing the attackers to exploit other parts of the organization's network. While the problem can reach a place of being unmanageable, there are methods and solutions available to tackle this problem. Links: Enterprise Access Model Credential Harvesting and Mitigations (PDF) Point of Entry: Why Hackers Target Stolen Credentials for Initial Access The Growing Threat from Infostealers
More episodes of the podcast Cyber Compliance & Beyond
19 - Zero Trust
04/11/2025
18 - The False Claims Act
25/09/2025
17 - Cybercrime – Email Threats – Part 4/4
05/08/2025
16 - The Cyber Workforce
02/07/2025
12 - Mobile Platform Security
11/03/2025
11 - CMMC Rollout – Q&A
13/02/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.