Threat actors leverage credential dumps, phishing, and legacy email protocols

Proofpoint Information Protection Research Team

Cover

In a recent study of major cloud service tenants, Proofpoint researchers observed massive attacks leveraging legacy protocols and credential dumps to increase the speed and effectiveness of brute force account compromises at scale.

Check out this blog to learn why your organization could benefit from a layered, intelligent security measure, such as user education to combat evolving threats that are increasingly successful in compromising user cloud accounts.

Vendor:
Proofpoint
Posted:
22 Aug 2019
Published:
22 Aug 2019
Format:
HTML
Type:
Resource
Language:
English
Already a Bitpipe member? Login here

Download this Resource!