Palo Alto Networks

credential-based attack

What Is a Credential-Based Attack?

Phishing and credential-based attacks have proven to be one of the most effective means of penetrating an organization. Attackers utilize various password-theft techniques to breach organizations, compromise their networks and steal critical data. There are two elements of a credential-based attack: credential theft and credential abuse.

Feb 16, 2017

Subscribe to the Blog!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.