“Authorized” to break in: Adversaries use valid credentials to compromise cloud environments
-
Overprivileged plaintext credentials left on display in 33% of X-Force adversary simulations Adversaries are constantly seeking to improve their productivity margins, but new data from IBM X-Force suggests they aren’t exclusively leaning on sophistication to do so. Simple yet reliable tactics that offer ease of use and often direct access to privileged environments are still […]
The post “Authorized” to break in: Adversaries use valid credentials to compromise cloud environments appeared first on Security Intelligence.
https://securityintelligence.com/adversaries-use-valid-credentials-compromise-cloud-environments/