Feb. 6, 2024, 8:30 a.m. | Hazel Burton

Cisco Talos Intelligence Group - Comprehensive Threat Intelligence blog.talosintelligence.com

You’ve probably heard the phrase, “Attackers don’t hack anyone these days. They log on.” In this blog, we describe the various tools and techniques bad actors are using to steal credentials so they can 'log on' with valid account details, and outline our recommendations for defense.

account attackers bad bad actors blog can credentials defense don hack log on the radar recommendations steal stolen techniques threat threat actors tools user credentials valid

More from blog.talosintelligence.com / Cisco Talos Intelligence Group - Comprehensive Threat Intelligence

Senior Frontend Engineer- Hyper automation team

@ SentinelOne | Tel Aviv-Yafo, Tel Aviv District, Israel

Product Manager (Remote)

@ Axur | São Paulo, State of São Paulo, Brazil - Remote

Account Executive (French speaking)

@ Darktrace | Paris

Senior Product Marketing Manager - Endpoint & Identity Security

@ SentinelOne | United States - Remote

Analyste SOC

@ Alter Solutions | Niort, France

IT Internal Auditor (Supervisor Level)

@ Umniah | Amman, Amman Governorate, Jordan